00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:02 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:02 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:02 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 72.369174] random: crng init done 2018/04/12 00:58:03 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x0, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:03 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 3: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:03 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:03 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:04 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:04 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 5: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 6: mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:04 executing program 5: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:04 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:04 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x0, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x0, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) 2018/04/12 00:58:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:05 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:05 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:05 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:06 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r2}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 2 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 4 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:06 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:06 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:06 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 75.935359] FAULT_INJECTION: forcing a failure. [ 75.935359] name failslab, interval 1, probability 0, space 0, times 1 [ 75.943562] FAULT_INJECTION: forcing a failure. [ 75.943562] name failslab, interval 1, probability 0, space 0, times 1 [ 75.946685] CPU: 0 PID: 8202 Comm: syz-executor2 Not tainted 4.16.0+ #17 [ 75.964676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 75.974029] Call Trace: [ 75.976623] dump_stack+0x1b9/0x294 [ 75.980257] ? dump_stack_print_info.cold.2+0x52/0x52 [ 75.985468] should_fail.cold.4+0xa/0x1a [ 75.989539] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 75.994649] ? lock_downgrade+0x8e0/0x8e0 [ 75.998804] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.004341] ? proc_fail_nth_write+0x96/0x1f0 [ 76.008838] ? proc_cwd_link+0x1d0/0x1d0 [ 76.012906] ? find_held_lock+0x36/0x1c0 [ 76.016983] ? fib_dump_info+0x610/0x1b80 [ 76.021154] ? check_same_owner+0x320/0x320 [ 76.025472] ? __lock_is_held+0xb5/0x140 [ 76.029540] ? rcu_note_context_switch+0x710/0x710 [ 76.034484] __should_failslab+0x124/0x180 [ 76.038723] should_failslab+0x9/0x14 [ 76.042523] __kmalloc_track_caller+0x2c4/0x760 [ 76.047198] ? strncpy_from_user+0x500/0x500 [ 76.051605] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.057142] ? strndup_user+0x77/0xd0 [ 76.060948] memdup_user+0x2c/0xa0 [ 76.064493] strndup_user+0x77/0xd0 [ 76.068122] ksys_mount+0x3c/0x140 [ 76.071666] SyS_mount+0x35/0x50 [ 76.075032] ? ksys_mount+0x140/0x140 [ 76.078838] do_syscall_64+0x29e/0x9d0 [ 76.082727] ? vmalloc_sync_all+0x30/0x30 [ 76.086871] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.091367] ? finish_task_switch+0x1ca/0x820 [ 76.095869] ? syscall_return_slowpath+0x5c0/0x5c0 [ 76.100799] ? syscall_return_slowpath+0x30f/0x5c0 [ 76.105733] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.111107] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.115961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.121146] RIP: 0033:0x455279 [ 76.124335] RSP: 002b:00007f906ca3cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.132053] RAX: ffffffffffffffda RBX: 00007f906ca3d6d4 RCX: 0000000000455279 [ 76.139319] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 76.146585] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 76.153850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 76.161115] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 [ 76.168417] CPU: 1 PID: 8201 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 76.175261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.184614] Call Trace: [ 76.187208] dump_stack+0x1b9/0x294 [ 76.190846] ? dump_stack_print_info.cold.2+0x52/0x52 [ 76.196047] ? perf_trace_lock_acquire+0xe3/0x980 [ 76.200920] should_fail.cold.4+0xa/0x1a [ 76.204993] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 76.210106] ? lock_downgrade+0x8e0/0x8e0 [ 76.214264] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.219803] ? proc_fail_nth_write+0x96/0x1f0 [ 76.224306] ? proc_cwd_link+0x1d0/0x1d0 [ 76.228374] ? find_held_lock+0x36/0x1c0 [ 76.232464] ? check_same_owner+0x320/0x320 [ 76.236790] ? __lock_is_held+0xb5/0x140 [ 76.240856] ? rcu_note_context_switch+0x710/0x710 [ 76.245800] __should_failslab+0x124/0x180 [ 76.250043] should_failslab+0x9/0x14 [ 76.253848] __kmalloc_track_caller+0x2c4/0x760 [ 76.258528] ? strncpy_from_user+0x500/0x500 [ 76.262943] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.268485] ? strndup_user+0x77/0xd0 [ 76.272298] memdup_user+0x2c/0xa0 [ 76.275841] strndup_user+0x77/0xd0 [ 76.279481] ksys_mount+0x3c/0x140 [ 76.283024] SyS_mount+0x35/0x50 [ 76.286391] ? ksys_mount+0x140/0x140 [ 76.290198] do_syscall_64+0x29e/0x9d0 [ 76.294086] ? vmalloc_sync_all+0x30/0x30 [ 76.298242] ? finish_task_switch+0x1ca/0x820 [ 76.302742] ? syscall_return_slowpath+0x5c0/0x5c0 [ 76.307680] ? syscall_return_slowpath+0x30f/0x5c0 [ 76.312617] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.317990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.322845] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.328036] RIP: 0033:0x455279 2018/04/12 00:58:07 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x0, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:07 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:07 executing program 2 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:07 executing program 1 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 76.331226] RSP: 002b:00007f78129d1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.338943] RAX: ffffffffffffffda RBX: 00007f78129d26d4 RCX: 0000000000455279 [ 76.346215] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 76.353488] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 76.360758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 76.368028] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 [ 76.450877] FAULT_INJECTION: forcing a failure. [ 76.450877] name failslab, interval 1, probability 0, space 0, times 0 [ 76.462180] CPU: 1 PID: 8218 Comm: syz-executor2 Not tainted 4.16.0+ #17 [ 76.469034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.478399] Call Trace: [ 76.481008] dump_stack+0x1b9/0x294 [ 76.484664] ? dump_stack_print_info.cold.2+0x52/0x52 [ 76.489903] should_fail.cold.4+0xa/0x1a [ 76.493993] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/12 00:58:07 executing program 4 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:07 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 76.499113] ? save_stack+0x43/0xd0 [ 76.502758] ? kasan_kmalloc+0xc4/0xe0 [ 76.506659] ? __kmalloc_track_caller+0x14a/0x760 [ 76.511518] ? memdup_user+0x2c/0xa0 [ 76.515250] ? strndup_user+0x77/0xd0 [ 76.519066] ? graph_lock+0x170/0x170 [ 76.522886] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.528271] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.533827] ? proc_fail_nth_write+0x96/0x1f0 [ 76.538355] ? find_held_lock+0x36/0x1c0 [ 76.542483] ? check_same_owner+0x320/0x320 [ 76.546819] ? lock_release+0xa10/0xa10 2018/04/12 00:58:07 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 76.550818] ? rcu_note_context_switch+0x710/0x710 [ 76.555771] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 76.560804] ? __check_object_size+0x95/0x5d9 [ 76.565326] __should_failslab+0x124/0x180 [ 76.569579] should_failslab+0x9/0x14 [ 76.573400] __kmalloc_track_caller+0x2c4/0x760 [ 76.578098] ? strncpy_from_user+0x500/0x500 [ 76.582526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 76.588083] ? strndup_user+0x77/0xd0 [ 76.591908] memdup_user+0x2c/0xa0 [ 76.595466] strndup_user+0x77/0xd0 [ 76.599114] ksys_mount+0x73/0x140 [ 76.602678] SyS_mount+0x35/0x50 [ 76.606062] ? ksys_mount+0x140/0x140 [ 76.609891] do_syscall_64+0x29e/0x9d0 [ 76.613805] ? vmalloc_sync_all+0x30/0x30 [ 76.617978] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.618829] FAULT_INJECTION: forcing a failure. [ 76.618829] name failslab, interval 1, probability 0, space 0, times 0 [ 76.622479] ? finish_task_switch+0x1ca/0x820 [ 76.622502] ? syscall_return_slowpath+0x5c0/0x5c0 [ 76.622533] ? syscall_return_slowpath+0x30f/0x5c0 [ 76.648021] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.653400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.658255] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.663440] RIP: 0033:0x455279 [ 76.666634] RSP: 002b:00007f906ca3cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.674345] RAX: ffffffffffffffda RBX: 00007f906ca3d6d4 RCX: 0000000000455279 [ 76.681614] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 76.688880] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 76.696146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 76.703411] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 [ 76.710711] CPU: 0 PID: 8221 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 76.717562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.726924] Call Trace: [ 76.729529] dump_stack+0x1b9/0x294 [ 76.733181] ? dump_stack_print_info.cold.2+0x52/0x52 [ 76.738410] should_fail.cold.4+0xa/0x1a [ 76.742497] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 76.747625] ? lock_downgrade+0x8e0/0x8e0 [ 76.751798] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.757360] ? proc_fail_nth_write+0x96/0x1f0 [ 76.761872] ? proc_cwd_link+0x1d0/0x1d0 [ 76.765951] ? find_held_lock+0x36/0x1c0 [ 76.770061] ? check_same_owner+0x320/0x320 [ 76.774403] ? __lock_is_held+0xb5/0x140 [ 76.778483] ? rcu_note_context_switch+0x710/0x710 [ 76.783436] __should_failslab+0x124/0x180 [ 76.787686] should_failslab+0x9/0x14 [ 76.791498] __kmalloc_track_caller+0x2c4/0x760 [ 76.796189] ? strncpy_from_user+0x500/0x500 [ 76.800661] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 76.806218] ? strndup_user+0x77/0xd0 [ 76.810044] memdup_user+0x2c/0xa0 [ 76.813604] strndup_user+0x77/0xd0 [ 76.817259] ksys_mount+0x3c/0x140 [ 76.820817] SyS_mount+0x35/0x50 [ 76.821118] FAULT_INJECTION: forcing a failure. [ 76.821118] name failslab, interval 1, probability 0, space 0, times 0 [ 76.824187] ? ksys_mount+0x140/0x140 [ 76.824212] do_syscall_64+0x29e/0x9d0 [ 76.824226] ? vmalloc_sync_all+0x30/0x30 [ 76.824249] ? _raw_spin_unlock_irq+0x27/0x70 [ 76.851674] ? finish_task_switch+0x1ca/0x820 [ 76.856172] ? syscall_return_slowpath+0x5c0/0x5c0 [ 76.861103] ? syscall_return_slowpath+0x30f/0x5c0 [ 76.866043] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 76.871415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 76.876268] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 76.881457] RIP: 0033:0x455279 [ 76.884643] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 76.892357] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 2018/04/12 00:58:07 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) r1 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 76.899621] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 76.906890] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 76.914158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 76.921425] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 [ 76.928727] CPU: 1 PID: 8238 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 76.935573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 76.944927] Call Trace: [ 76.947521] dump_stack+0x1b9/0x294 2018/04/12 00:58:07 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:07 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 76.951162] ? dump_stack_print_info.cold.2+0x52/0x52 [ 76.956359] ? perf_trace_lock_acquire+0xe3/0x980 [ 76.961208] ? __save_stack_trace+0x7e/0xd0 [ 76.965543] should_fail.cold.4+0xa/0x1a [ 76.969615] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 76.974723] ? save_stack+0x43/0xd0 [ 76.978354] ? kasan_kmalloc+0xc4/0xe0 [ 76.982243] ? __kmalloc_track_caller+0x14a/0x760 [ 76.987089] ? memdup_user+0x2c/0xa0 [ 76.990811] ? strndup_user+0x77/0xd0 [ 76.994608] ? graph_lock+0x170/0x170 2018/04/12 00:58:07 executing program 1 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 76.998408] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 77.003779] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 77.009327] ? proc_fail_nth_write+0x96/0x1f0 [ 77.013831] ? proc_cwd_link+0x1d0/0x1d0 [ 77.017899] ? find_held_lock+0x36/0x1c0 [ 77.021990] ? check_same_owner+0x320/0x320 [ 77.026312] ? lock_release+0xa10/0xa10 [ 77.030296] ? rcu_note_context_switch+0x710/0x710 [ 77.035231] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 77.040247] ? __check_object_size+0x95/0x5d9 [ 77.044755] __should_failslab+0x124/0x180 [ 77.048995] should_failslab+0x9/0x14 [ 77.052802] __kmalloc_track_caller+0x2c4/0x760 [ 77.057477] ? strncpy_from_user+0x500/0x500 [ 77.061894] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 77.067438] ? strndup_user+0x77/0xd0 [ 77.071249] memdup_user+0x2c/0xa0 [ 77.074792] strndup_user+0x77/0xd0 [ 77.078431] ksys_mount+0x73/0x140 [ 77.081978] SyS_mount+0x35/0x50 [ 77.085345] ? ksys_mount+0x140/0x140 [ 77.089156] do_syscall_64+0x29e/0x9d0 [ 77.093049] ? vmalloc_sync_all+0x30/0x30 [ 77.097199] ? _raw_spin_unlock_irq+0x27/0x70 [ 77.101701] ? finish_task_switch+0x1ca/0x820 [ 77.106207] ? syscall_return_slowpath+0x5c0/0x5c0 [ 77.111148] ? syscall_return_slowpath+0x30f/0x5c0 [ 77.116086] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 77.121458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.126314] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 77.131502] RIP: 0033:0x455279 [ 77.134701] RSP: 002b:00007f78129d1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 77.142413] RAX: ffffffffffffffda RBX: 00007f78129d26d4 RCX: 0000000000455279 [ 77.149677] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 77.156947] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 77.164216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 77.171469] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 2018/04/12 00:58:08 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:08 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:08 executing program 2 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:08 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 77.273960] FAULT_INJECTION: forcing a failure. [ 77.273960] name failslab, interval 1, probability 0, space 0, times 0 [ 77.285410] CPU: 1 PID: 8252 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 77.292265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.292944] FAULT_INJECTION: forcing a failure. [ 77.292944] name failslab, interval 1, probability 0, space 0, times 0 [ 77.301702] Call Trace: [ 77.301730] dump_stack+0x1b9/0x294 [ 77.301753] ? dump_stack_print_info.cold.2+0x52/0x52 [ 77.301770] ? perf_trace_lock_acquire+0xe3/0x980 [ 77.301792] ? __save_stack_trace+0x7e/0xd0 [ 77.301818] should_fail.cold.4+0xa/0x1a [ 77.301842] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 77.342601] ? save_stack+0x43/0xd0 [ 77.346220] ? kasan_kmalloc+0xc4/0xe0 [ 77.350098] ? __kmalloc_track_caller+0x14a/0x760 [ 77.354941] ? memdup_user+0x2c/0xa0 [ 77.358646] ? strndup_user+0x77/0xd0 [ 77.362439] ? graph_lock+0x170/0x170 [ 77.366232] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 77.371592] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 77.377123] ? proc_fail_nth_write+0x96/0x1f0 [ 77.381612] ? proc_cwd_link+0x1d0/0x1d0 [ 77.385670] ? find_held_lock+0x36/0x1c0 [ 77.389741] ? check_same_owner+0x320/0x320 [ 77.394059] ? lock_release+0xa10/0xa10 [ 77.398032] ? rcu_note_context_switch+0x710/0x710 [ 77.402957] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 77.407965] ? __check_object_size+0x95/0x5d9 [ 77.412458] __should_failslab+0x124/0x180 [ 77.416689] should_failslab+0x9/0x14 [ 77.420479] __kmalloc_track_caller+0x2c4/0x760 [ 77.425143] ? strncpy_from_user+0x500/0x500 [ 77.429542] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 77.435070] ? strndup_user+0x77/0xd0 [ 77.438869] memdup_user+0x2c/0xa0 [ 77.442401] strndup_user+0x77/0xd0 [ 77.446027] ksys_mount+0x73/0x140 [ 77.449566] SyS_mount+0x35/0x50 [ 77.452921] ? ksys_mount+0x140/0x140 [ 77.456718] do_syscall_64+0x29e/0x9d0 [ 77.460600] ? vmalloc_sync_all+0x30/0x30 [ 77.464737] ? _raw_spin_unlock_irq+0x27/0x70 [ 77.469230] ? finish_task_switch+0x1ca/0x820 [ 77.473718] ? syscall_return_slowpath+0x5c0/0x5c0 [ 77.478640] ? syscall_return_slowpath+0x30f/0x5c0 [ 77.483566] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 77.488928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.493771] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 77.498952] RIP: 0033:0x455279 [ 77.502135] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 77.509836] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 77.517548] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 77.524810] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 77.532071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 77.539330] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 [ 77.546616] CPU: 0 PID: 8258 Comm: syz-executor2 Not tainted 4.16.0+ #17 [ 77.553466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.562829] Call Trace: [ 77.565447] dump_stack+0x1b9/0x294 [ 77.569102] ? dump_stack_print_info.cold.2+0x52/0x52 [ 77.574329] should_fail.cold.4+0xa/0x1a [ 77.578414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 77.583530] ? kasan_kmalloc+0xc4/0xe0 [ 77.587426] ? __kmalloc_track_caller+0x14a/0x760 [ 77.592280] ? memdup_user+0x2c/0xa0 [ 77.596004] ? strndup_user+0x77/0xd0 [ 77.600167] ? graph_lock+0x170/0x170 [ 77.603982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 77.609521] ? proc_fail_nth_write+0x96/0x1f0 [ 77.614036] ? find_held_lock+0x36/0x1c0 [ 77.618159] ? check_same_owner+0x320/0x320 [ 77.622495] ? lock_release+0xa10/0xa10 [ 77.626491] ? rcu_note_context_switch+0x710/0x710 [ 77.631430] ? __check_object_size+0x95/0x5d9 [ 77.635950] __should_failslab+0x124/0x180 [ 77.640202] should_failslab+0x9/0x14 [ 77.644013] kmem_cache_alloc_trace+0x2cb/0x780 [ 77.648709] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 77.654266] ? _copy_from_user+0xdf/0x150 [ 77.658440] copy_mount_options+0x5f/0x380 [ 77.662689] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 77.668243] ksys_mount+0xd0/0x140 [ 77.671808] SyS_mount+0x35/0x50 [ 77.675181] ? ksys_mount+0x140/0x140 [ 77.679001] do_syscall_64+0x29e/0x9d0 [ 77.682899] ? vmalloc_sync_all+0x30/0x30 [ 77.687063] ? _raw_spin_unlock_irq+0x27/0x70 [ 77.691575] ? finish_task_switch+0x1ca/0x820 [ 77.696093] ? syscall_return_slowpath+0x5c0/0x5c0 [ 77.701046] ? syscall_return_slowpath+0x30f/0x5c0 [ 77.705998] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 77.711387] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 77.716259] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 77.721461] RIP: 0033:0x455279 [ 77.724662] RSP: 002b:00007f906ca3cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 77.732389] RAX: ffffffffffffffda RBX: 00007f906ca3d6d4 RCX: 0000000000455279 [ 77.739662] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 77.746918] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 77.754173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 77.761432] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 2018/04/12 00:58:08 executing program 4 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:08 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:08 executing program 1 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:08 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:08 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:08 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:08 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:08 executing program 2 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 77.894995] FAULT_INJECTION: forcing a failure. [ 77.894995] name failslab, interval 1, probability 0, space 0, times 0 [ 77.906499] CPU: 0 PID: 8275 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 77.913362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 77.922361] FAULT_INJECTION: forcing a failure. [ 77.922361] name failslab, interval 1, probability 0, space 0, times 0 [ 77.922725] Call Trace: [ 77.922751] dump_stack+0x1b9/0x294 [ 77.922780] ? dump_stack_print_info.cold.2+0x52/0x52 [ 77.922816] should_fail.cold.4+0xa/0x1a [ 77.949419] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 77.954524] ? kasan_kmalloc+0xc4/0xe0 [ 77.958410] ? __kmalloc_track_caller+0x14a/0x760 [ 77.963254] ? memdup_user+0x2c/0xa0 [ 77.966967] ? strndup_user+0x77/0xd0 [ 77.970767] ? graph_lock+0x170/0x170 [ 77.974575] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 77.980114] ? proc_fail_nth_write+0x96/0x1f0 [ 77.984620] ? find_held_lock+0x36/0x1c0 [ 77.988717] ? check_same_owner+0x320/0x320 [ 77.993038] ? lock_release+0xa10/0xa10 [ 77.997021] ? rcu_note_context_switch+0x710/0x710 [ 78.001949] ? __check_object_size+0x95/0x5d9 [ 78.006456] __should_failslab+0x124/0x180 [ 78.010696] should_failslab+0x9/0x14 [ 78.014500] kmem_cache_alloc_trace+0x2cb/0x780 [ 78.019174] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.024710] ? _copy_from_user+0xdf/0x150 [ 78.028865] copy_mount_options+0x5f/0x380 [ 78.033104] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.038653] ksys_mount+0xd0/0x140 [ 78.042199] SyS_mount+0x35/0x50 [ 78.045568] ? ksys_mount+0x140/0x140 [ 78.049377] do_syscall_64+0x29e/0x9d0 [ 78.053264] ? vmalloc_sync_all+0x30/0x30 [ 78.057410] ? _raw_spin_unlock_irq+0x27/0x70 [ 78.061906] ? finish_task_switch+0x1ca/0x820 [ 78.066405] ? syscall_return_slowpath+0x5c0/0x5c0 [ 78.071336] ? syscall_return_slowpath+0x30f/0x5c0 [ 78.076274] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 78.081648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 78.086502] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 78.091687] RIP: 0033:0x455279 [ 78.094873] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.102585] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 78.109849] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 78.117116] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 78.124380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 78.131649] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 [ 78.138947] CPU: 1 PID: 8284 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 78.145790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.155142] Call Trace: [ 78.157741] dump_stack+0x1b9/0x294 [ 78.161382] ? dump_stack_print_info.cold.2+0x52/0x52 [ 78.166576] ? perf_trace_lock_acquire+0xe3/0x980 [ 78.171440] should_fail.cold.4+0xa/0x1a [ 78.175515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 78.179758] FAULT_INJECTION: forcing a failure. [ 78.179758] name failslab, interval 1, probability 0, space 0, times 0 [ 78.180616] ? kasan_kmalloc+0xc4/0xe0 [ 78.180630] ? __kmalloc_track_caller+0x14a/0x760 [ 78.180653] ? memdup_user+0x2c/0xa0 [ 78.204202] ? strndup_user+0x77/0xd0 [ 78.208000] ? graph_lock+0x170/0x170 [ 78.211802] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 78.217336] ? proc_fail_nth_write+0x96/0x1f0 [ 78.221827] ? proc_cwd_link+0x1d0/0x1d0 [ 78.225884] ? find_held_lock+0x36/0x1c0 [ 78.229960] ? check_same_owner+0x320/0x320 [ 78.234270] ? lock_release+0xa10/0xa10 [ 78.238240] ? rcu_note_context_switch+0x710/0x710 [ 78.243160] ? __check_object_size+0x95/0x5d9 [ 78.247655] __should_failslab+0x124/0x180 [ 78.251886] should_failslab+0x9/0x14 [ 78.255677] kmem_cache_alloc_trace+0x2cb/0x780 [ 78.260345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.265874] ? _copy_from_user+0xdf/0x150 [ 78.270019] copy_mount_options+0x5f/0x380 [ 78.274251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.279780] ksys_mount+0xd0/0x140 [ 78.283314] SyS_mount+0x35/0x50 [ 78.286670] ? ksys_mount+0x140/0x140 [ 78.290469] do_syscall_64+0x29e/0x9d0 [ 78.294351] ? vmalloc_sync_all+0x30/0x30 [ 78.298488] ? _raw_spin_unlock_irq+0x27/0x70 [ 78.302976] ? finish_task_switch+0x1ca/0x820 [ 78.307468] ? syscall_return_slowpath+0x5c0/0x5c0 [ 78.312393] ? syscall_return_slowpath+0x30f/0x5c0 [ 78.317319] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 78.322679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 78.327520] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 78.332704] RIP: 0033:0x455279 [ 78.335882] RSP: 002b:00007f78129d1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.343583] RAX: ffffffffffffffda RBX: 00007f78129d26d4 RCX: 0000000000455279 [ 78.350843] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 78.358101] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 78.365357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 78.372615] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 [ 78.379898] CPU: 0 PID: 8285 Comm: syz-executor2 Not tainted 4.16.0+ #17 [ 78.386744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.396107] Call Trace: [ 78.398711] dump_stack+0x1b9/0x294 [ 78.402363] ? dump_stack_print_info.cold.2+0x52/0x52 [ 78.407571] ? finish_task_switch+0x1ca/0x820 [ 78.412078] ? finish_task_switch+0x182/0x820 [ 78.416599] should_fail.cold.4+0xa/0x1a [ 78.420678] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 78.425812] ? __schedule+0x80f/0x1e40 [ 78.429714] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 78.434933] ? __sched_text_start+0x8/0x8 [ 78.439094] ? find_held_lock+0x36/0x1c0 [ 78.443220] ? check_same_owner+0x320/0x320 [ 78.447566] ? save_stack+0xa9/0xd0 [ 78.451221] __should_failslab+0x124/0x180 [ 78.455471] should_failslab+0x9/0x14 [ 78.459286] kmem_cache_alloc+0x2af/0x760 [ 78.463462] getname_flags+0xd0/0x5a0 [ 78.467283] user_path_at_empty+0x2d/0x50 [ 78.471446] do_mount+0x172/0x3070 [ 78.475012] ? copy_mount_string+0x40/0x40 [ 78.479265] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 78.484048] ? retint_kernel+0x10/0x10 [ 78.487963] ? copy_mount_options+0x1e3/0x380 [ 78.492479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.498036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.503589] ? copy_mount_options+0x285/0x380 [ 78.508095] ksys_mount+0x12d/0x140 [ 78.511733] SyS_mount+0x35/0x50 [ 78.515113] ? ksys_mount+0x140/0x140 [ 78.518936] do_syscall_64+0x29e/0x9d0 [ 78.522837] ? vmalloc_sync_all+0x30/0x30 [ 78.526999] ? _raw_spin_unlock_irq+0x27/0x70 [ 78.531508] ? finish_task_switch+0x1ca/0x820 [ 78.536024] ? syscall_return_slowpath+0x5c0/0x5c0 [ 78.540974] ? syscall_return_slowpath+0x30f/0x5c0 [ 78.545927] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 78.551315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 78.556183] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 78.561382] RIP: 0033:0x455279 [ 78.564577] RSP: 002b:00007f906ca3cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.572305] RAX: ffffffffffffffda RBX: 00007f906ca3d6d4 RCX: 0000000000455279 [ 78.579591] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 78.586870] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 78.594146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 78.601421] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 2018/04/12 00:58:09 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:09 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 1 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:09 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:09 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:09 executing program 4 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 2 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 78.749631] FAULT_INJECTION: forcing a failure. [ 78.749631] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 78.761480] CPU: 1 PID: 8313 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 78.768318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.777672] Call Trace: [ 78.780270] dump_stack+0x1b9/0x294 [ 78.783910] ? dump_stack_print_info.cold.2+0x52/0x52 [ 78.789110] ? find_held_lock+0x36/0x1c0 [ 78.793185] should_fail.cold.4+0xa/0x1a [ 78.797261] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 78.798140] FAULT_INJECTION: forcing a failure. [ 78.798140] name failslab, interval 1, probability 0, space 0, times 0 [ 78.802373] ? debug_check_no_locks_freed+0x310/0x310 [ 78.802394] ? debug_check_no_locks_freed+0x310/0x310 [ 78.802419] ? is_bpf_text_address+0xd7/0x170 [ 78.802442] ? kernel_text_address+0x79/0xf0 [ 78.832819] ? __unwind_start+0x166/0x330 [ 78.836962] ? __kernel_text_address+0xd/0x40 [ 78.841451] ? unwind_get_return_address+0x61/0xa0 [ 78.846372] ? perf_trace_lock_acquire+0xe3/0x980 [ 78.851215] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 78.856746] ? should_fail+0x21b/0xbcd [ 78.860630] __alloc_pages_nodemask+0x34e/0xd70 [ 78.865295] ? memdup_user+0x2c/0xa0 [ 78.869001] ? strndup_user+0x77/0xd0 [ 78.872808] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 78.877820] ? proc_cwd_link+0x1d0/0x1d0 [ 78.881875] ? find_held_lock+0x36/0x1c0 [ 78.885951] ? check_same_owner+0x320/0x320 [ 78.890260] ? lock_release+0xa10/0xa10 [ 78.894231] cache_grow_begin+0x72/0x6c0 [ 78.898291] kmem_cache_alloc_trace+0x6a5/0x780 [ 78.902954] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.908486] copy_mount_options+0x5f/0x380 [ 78.912715] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.918246] ksys_mount+0xd0/0x140 [ 78.921779] SyS_mount+0x35/0x50 [ 78.925138] ? ksys_mount+0x140/0x140 [ 78.928936] do_syscall_64+0x29e/0x9d0 [ 78.932814] ? vmalloc_sync_all+0x30/0x30 [ 78.936954] ? _raw_spin_unlock_irq+0x27/0x70 [ 78.941445] ? finish_task_switch+0x1ca/0x820 [ 78.945938] ? syscall_return_slowpath+0x5c0/0x5c0 [ 78.950861] ? syscall_return_slowpath+0x30f/0x5c0 [ 78.955789] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 78.961149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 78.965988] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 78.971167] RIP: 0033:0x455279 [ 78.974349] RSP: 002b:00007f78129d1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 78.982051] RAX: ffffffffffffffda RBX: 00007f78129d26d4 RCX: 0000000000455279 [ 78.989309] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 78.996567] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 79.003828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 79.011087] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 [ 79.018365] CPU: 0 PID: 8314 Comm: syz-executor2 Not tainted 4.16.0+ #17 [ 79.025217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.034579] Call Trace: [ 79.037186] dump_stack+0x1b9/0x294 [ 79.040838] ? dump_stack_print_info.cold.2+0x52/0x52 [ 79.046043] ? find_held_lock+0x36/0x1c0 [ 79.050141] should_fail.cold.4+0xa/0x1a [ 79.054231] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 79.059363] ? kasan_check_read+0x11/0x20 [ 79.063542] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 79.068763] ? find_held_lock+0x36/0x1c0 [ 79.072882] ? check_same_owner+0x320/0x320 [ 79.077227] ? rcu_note_context_switch+0x710/0x710 [ 79.082173] ? save_stack+0xa9/0xd0 [ 79.085820] __should_failslab+0x124/0x180 [ 79.090070] should_failslab+0x9/0x14 [ 79.093883] kmem_cache_alloc+0x2af/0x760 [ 79.098047] ? find_held_lock+0x36/0x1c0 [ 79.102144] getname_flags+0xd0/0x5a0 [ 79.105972] user_path_at_empty+0x2d/0x50 [ 79.110140] do_mount+0x172/0x3070 [ 79.113693] ? do_raw_spin_unlock+0x9e/0x2e0 [ 79.118124] ? copy_mount_string+0x40/0x40 [ 79.122378] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 79.127413] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.132209] ? retint_kernel+0x10/0x10 [ 79.136130] ? copy_mount_options+0x1f0/0x380 [ 79.140636] ? copy_mount_options+0x206/0x380 [ 79.145160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.150712] ? copy_mount_options+0x285/0x380 [ 79.155230] ksys_mount+0x12d/0x140 [ 79.158876] SyS_mount+0x35/0x50 [ 79.162253] ? ksys_mount+0x140/0x140 [ 79.166076] do_syscall_64+0x29e/0x9d0 [ 79.169977] ? vmalloc_sync_all+0x30/0x30 [ 79.174151] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 79.179016] ? syscall_return_slowpath+0x5c0/0x5c0 [ 79.183965] ? syscall_return_slowpath+0x30f/0x5c0 [ 79.188925] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 79.194311] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/12 00:58:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 4 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:09 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 79.199181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 79.204377] RIP: 0033:0x455279 [ 79.207576] RSP: 002b:00007f906ca3cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 79.209991] FAULT_INJECTION: forcing a failure. [ 79.209991] name failslab, interval 1, probability 0, space 0, times 0 [ 79.215385] RAX: ffffffffffffffda RBX: 00007f906ca3d6d4 RCX: 0000000000455279 [ 79.215396] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 79.215407] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 79.215419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 79.215430] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 [ 79.253790] FAULT_INJECTION: forcing a failure. [ 79.253790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 79.255920] CPU: 1 PID: 8328 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 79.281756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.291097] Call Trace: [ 79.293681] dump_stack+0x1b9/0x294 [ 79.297303] ? dump_stack_print_info.cold.2+0x52/0x52 [ 79.302484] ? perf_trace_lock_acquire+0xe3/0x980 [ 79.307317] ? find_held_lock+0x36/0x1c0 [ 79.311377] should_fail.cold.4+0xa/0x1a [ 79.315432] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 79.320527] ? kasan_check_read+0x11/0x20 [ 79.324670] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 79.329856] ? find_held_lock+0x36/0x1c0 [ 79.333929] ? check_same_owner+0x320/0x320 [ 79.338241] ? rcu_note_context_switch+0x710/0x710 [ 79.343162] ? save_stack+0xa9/0xd0 [ 79.346787] __should_failslab+0x124/0x180 [ 79.351015] should_failslab+0x9/0x14 [ 79.354806] kmem_cache_alloc+0x2af/0x760 [ 79.358944] ? find_held_lock+0x36/0x1c0 [ 79.363002] getname_flags+0xd0/0x5a0 [ 79.366794] user_path_at_empty+0x2d/0x50 [ 79.370932] do_mount+0x172/0x3070 [ 79.374463] ? do_raw_spin_unlock+0x9e/0x2e0 [ 79.378862] ? copy_mount_string+0x40/0x40 [ 79.383086] ? rcu_pm_notify+0xc0/0xc0 [ 79.386971] ? copy_mount_options+0x5f/0x380 [ 79.391370] ? rcu_read_lock_sched_held+0x108/0x120 [ 79.396374] ? kmem_cache_alloc_trace+0x616/0x780 [ 79.401210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 79.406740] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.412268] ? copy_mount_options+0x285/0x380 [ 79.416754] ksys_mount+0x12d/0x140 [ 79.420370] SyS_mount+0x35/0x50 [ 79.423724] ? ksys_mount+0x140/0x140 [ 79.427516] do_syscall_64+0x29e/0x9d0 [ 79.431392] ? vmalloc_sync_all+0x30/0x30 [ 79.435532] ? _raw_spin_unlock_irq+0x27/0x70 [ 79.440019] ? finish_task_switch+0x1ca/0x820 [ 79.444528] ? syscall_return_slowpath+0x5c0/0x5c0 [ 79.449451] ? syscall_return_slowpath+0x30f/0x5c0 [ 79.454423] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 79.459785] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 79.464624] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 79.469800] RIP: 0033:0x455279 [ 79.472977] RSP: 002b:00007f78129d1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 79.480677] RAX: ffffffffffffffda RBX: 00007f78129d26d4 RCX: 0000000000455279 [ 79.487938] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 79.495197] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 79.502455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 79.509710] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 [ 79.517314] CPU: 0 PID: 8311 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 79.524180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.533544] Call Trace: [ 79.536149] dump_stack+0x1b9/0x294 [ 79.539801] ? dump_stack_print_info.cold.2+0x52/0x52 [ 79.545010] ? find_held_lock+0x36/0x1c0 [ 79.549109] should_fail.cold.4+0xa/0x1a [ 79.553198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 79.558332] ? debug_check_no_locks_freed+0x310/0x310 [ 79.563547] ? perf_tp_event+0xc30/0xc30 [ 79.567626] ? perf_tp_event+0xc30/0xc30 [ 79.571710] ? memset+0x31/0x40 [ 79.575540] ? perf_trace_lock_acquire+0x4f1/0x980 [ 79.580497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 79.586048] ? should_fail+0x21b/0xbcd [ 79.589961] __alloc_pages_nodemask+0x34e/0xd70 [ 79.594644] ? memdup_user+0x2c/0xa0 [ 79.598372] ? strndup_user+0x77/0xd0 [ 79.602193] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 79.607237] ? find_held_lock+0x36/0x1c0 [ 79.611357] ? check_same_owner+0x320/0x320 [ 79.615692] ? lock_release+0xa10/0xa10 [ 79.619688] cache_grow_begin+0x72/0x6c0 [ 79.623775] kmem_cache_alloc_trace+0x6a5/0x780 [ 79.628467] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 79.634029] copy_mount_options+0x5f/0x380 [ 79.638281] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 79.643842] ksys_mount+0xd0/0x140 [ 79.647404] SyS_mount+0x35/0x50 [ 79.650782] ? ksys_mount+0x140/0x140 [ 79.654598] do_syscall_64+0x29e/0x9d0 [ 79.658498] ? vmalloc_sync_all+0x30/0x30 [ 79.662658] ? _raw_spin_unlock_irq+0x27/0x70 [ 79.667170] ? finish_task_switch+0x1ca/0x820 [ 79.671682] ? syscall_return_slowpath+0x5c0/0x5c0 [ 79.676629] ? syscall_return_slowpath+0x30f/0x5c0 [ 79.681584] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 79.686975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 79.691847] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 79.697050] RIP: 0033:0x455279 2018/04/12 00:58:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 79.700261] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 79.707985] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 79.715265] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 79.722545] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 79.729824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 79.737109] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 2018/04/12 00:58:10 executing program 4 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:10 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:10 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:10 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:10 executing program 2 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:10 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:10 executing program 1 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:10 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 79.911236] FAULT_INJECTION: forcing a failure. [ 79.911236] name failslab, interval 1, probability 0, space 0, times 0 [ 79.922567] CPU: 1 PID: 8356 Comm: syz-executor4 Not tainted 4.16.0+ #17 [ 79.926684] FAULT_INJECTION: forcing a failure. [ 79.926684] name failslab, interval 1, probability 0, space 0, times 0 [ 79.929403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.929410] Call Trace: [ 79.929434] dump_stack+0x1b9/0x294 [ 79.929456] ? dump_stack_print_info.cold.2+0x52/0x52 [ 79.929471] ? perf_trace_lock_acquire+0xe3/0x980 [ 79.929494] ? kernel_text_address+0x79/0xf0 [ 79.970580] ? __unwind_start+0x166/0x330 [ 79.974725] ? __kernel_text_address+0xd/0x40 [ 79.979219] should_fail.cold.4+0xa/0x1a [ 79.983278] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 79.988377] ? perf_trace_lock_acquire+0xe3/0x980 [ 79.993215] ? save_stack+0x43/0xd0 [ 79.996842] ? find_held_lock+0x36/0x1c0 [ 80.000914] ? check_same_owner+0x320/0x320 [ 80.005231] ? rcu_note_context_switch+0x710/0x710 [ 80.010158] __should_failslab+0x124/0x180 [ 80.014387] should_failslab+0x9/0x14 [ 80.018180] __kmalloc_track_caller+0x2c4/0x760 [ 80.022844] ? kasan_check_read+0x11/0x20 [ 80.026983] ? do_raw_spin_unlock+0x9e/0x2e0 [ 80.031384] ? kstrdup_const+0x66/0x80 [ 80.035266] kstrdup+0x39/0x70 [ 80.038453] kstrdup_const+0x66/0x80 [ 80.042163] alloc_vfsmnt+0x1b3/0x9d0 [ 80.045961] ? mnt_free_id.isra.27+0x60/0x60 [ 80.050366] ? kasan_check_read+0x11/0x20 [ 80.054505] ? graph_lock+0x170/0x170 [ 80.058300] ? rcu_pm_notify+0xc0/0xc0 [ 80.062180] ? trace_hardirqs_off+0xd/0x10 [ 80.066410] ? putname+0xf2/0x130 [ 80.069857] ? putname+0xf2/0x130 [ 80.073304] ? find_held_lock+0x36/0x1c0 [ 80.077367] ? lock_downgrade+0x8e0/0x8e0 [ 80.081509] ? module_unload_free+0x5b0/0x5b0 [ 80.085996] ? lock_release+0xa10/0xa10 [ 80.089971] ? mpi_free.cold.1+0x19/0x19 [ 80.094032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.099571] vfs_kern_mount.part.34+0x88/0x4d0 [ 80.104148] ? may_umount+0xb0/0xb0 [ 80.107768] ? _raw_read_unlock+0x22/0x30 [ 80.111908] ? __get_fs_type+0x97/0xc0 [ 80.115790] do_mount+0x564/0x3070 [ 80.119326] ? copy_mount_string+0x40/0x40 [ 80.123554] ? rcu_pm_notify+0xc0/0xc0 [ 80.127441] ? copy_mount_options+0x5f/0x380 [ 80.131840] ? rcu_read_lock_sched_held+0x108/0x120 [ 80.136849] ? kmem_cache_alloc_trace+0x616/0x780 [ 80.141687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 80.147234] ? _copy_from_user+0xdf/0x150 [ 80.151379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.156908] ? copy_mount_options+0x285/0x380 [ 80.161402] ksys_mount+0x12d/0x140 [ 80.165024] SyS_mount+0x35/0x50 [ 80.168382] ? ksys_mount+0x140/0x140 [ 80.172180] do_syscall_64+0x29e/0x9d0 [ 80.176063] ? vmalloc_sync_all+0x30/0x30 [ 80.180204] ? _raw_spin_unlock_irq+0x27/0x70 [ 80.184691] ? finish_task_switch+0x1ca/0x820 [ 80.189182] ? syscall_return_slowpath+0x5c0/0x5c0 [ 80.194107] ? syscall_return_slowpath+0x30f/0x5c0 [ 80.199036] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 80.204400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 80.209238] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 80.214417] RIP: 0033:0x455279 [ 80.217595] RSP: 002b:00007f78129d1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 80.225296] RAX: ffffffffffffffda RBX: 00007f78129d26d4 RCX: 0000000000455279 [ 80.232559] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 80.239817] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 80.247075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 80.254334] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 [ 80.261614] CPU: 0 PID: 8362 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 80.268467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.277828] Call Trace: [ 80.280439] dump_stack+0x1b9/0x294 [ 80.284095] ? dump_stack_print_info.cold.2+0x52/0x52 [ 80.289328] should_fail.cold.4+0xa/0x1a [ 80.293412] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 80.298535] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 80.303756] ? is_bpf_text_address+0xd7/0x170 [ 80.308285] ? find_held_lock+0x36/0x1c0 [ 80.308456] FAULT_INJECTION: forcing a failure. [ 80.308456] name failslab, interval 1, probability 0, space 0, times 0 [ 80.312392] ? check_same_owner+0x320/0x320 [ 80.312409] ? perf_tp_event+0xc30/0xc30 [ 80.312432] ? putname+0xf2/0x130 [ 80.335392] ? rcu_note_context_switch+0x710/0x710 [ 80.340316] ? ksys_mount+0x12d/0x140 [ 80.344111] ? SyS_mount+0x35/0x50 [ 80.347648] ? do_syscall_64+0x29e/0x9d0 [ 80.351717] __should_failslab+0x124/0x180 [ 80.355956] should_failslab+0x9/0x14 [ 80.359755] kmem_cache_alloc+0x2af/0x760 [ 80.363904] ? perf_trace_lock_acquire+0x4f1/0x980 [ 80.368849] alloc_vfsmnt+0xe0/0x9d0 [ 80.372565] ? mnt_free_id.isra.27+0x60/0x60 [ 80.376975] ? kasan_check_read+0x11/0x20 [ 80.381234] ? graph_lock+0x170/0x170 [ 80.385043] ? rcu_pm_notify+0xc0/0xc0 [ 80.388927] ? trace_hardirqs_off+0xd/0x10 [ 80.393166] ? putname+0xf2/0x130 [ 80.396622] ? putname+0xf2/0x130 [ 80.400079] ? find_held_lock+0x36/0x1c0 [ 80.404157] ? lock_downgrade+0x8e0/0x8e0 [ 80.408307] ? module_unload_free+0x5b0/0x5b0 [ 80.412802] ? lock_release+0xa10/0xa10 [ 80.416786] ? mpi_free.cold.1+0x19/0x19 [ 80.420851] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.426395] vfs_kern_mount.part.34+0x88/0x4d0 [ 80.430981] ? may_umount+0xb0/0xb0 [ 80.434610] ? _raw_read_unlock+0x22/0x30 [ 80.438761] ? __get_fs_type+0x97/0xc0 [ 80.442656] do_mount+0x564/0x3070 [ 80.446207] ? copy_mount_string+0x40/0x40 [ 80.450441] ? rcu_pm_notify+0xc0/0xc0 [ 80.454341] ? copy_mount_options+0x5f/0x380 [ 80.458750] ? rcu_read_lock_sched_held+0x108/0x120 [ 80.463765] ? kmem_cache_alloc_trace+0x616/0x780 [ 80.468613] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 80.474149] ? _copy_from_user+0xdf/0x150 [ 80.478303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.483836] ? copy_mount_options+0x285/0x380 [ 80.488337] ksys_mount+0x12d/0x140 [ 80.491969] SyS_mount+0x35/0x50 [ 80.495333] ? ksys_mount+0x140/0x140 [ 80.499141] do_syscall_64+0x29e/0x9d0 [ 80.503037] ? vmalloc_sync_all+0x30/0x30 [ 80.507184] ? _raw_spin_unlock_irq+0x27/0x70 [ 80.511679] ? finish_task_switch+0x1ca/0x820 [ 80.516176] ? syscall_return_slowpath+0x5c0/0x5c0 [ 80.521197] ? syscall_return_slowpath+0x30f/0x5c0 [ 80.526135] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 80.531507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 80.536360] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 80.541546] RIP: 0033:0x455279 [ 80.544730] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 80.552441] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 80.559708] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 80.566975] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 80.574241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 80.581504] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 [ 80.588803] CPU: 1 PID: 8358 Comm: syz-executor2 Not tainted 4.16.0+ #17 [ 80.595655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.605014] Call Trace: [ 80.607627] dump_stack+0x1b9/0x294 [ 80.611279] ? dump_stack_print_info.cold.2+0x52/0x52 [ 80.616518] should_fail.cold.4+0xa/0x1a [ 80.620606] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 80.625730] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 80.630956] ? is_bpf_text_address+0xd7/0x170 [ 80.635478] ? find_held_lock+0x36/0x1c0 [ 80.639591] ? check_same_owner+0x320/0x320 [ 80.643931] ? perf_tp_event+0xc30/0xc30 [ 80.648090] ? putname+0xf2/0x130 [ 80.651563] ? rcu_note_context_switch+0x710/0x710 [ 80.653091] FAULT_INJECTION: forcing a failure. [ 80.653091] name failslab, interval 1, probability 0, space 0, times 0 [ 80.656499] ? ksys_mount+0x12d/0x140 [ 80.656518] ? SyS_mount+0x35/0x50 [ 80.656539] ? do_syscall_64+0x29e/0x9d0 [ 80.656566] __should_failslab+0x124/0x180 [ 80.656587] should_failslab+0x9/0x14 [ 80.656601] kmem_cache_alloc+0x2af/0x760 [ 80.656618] ? perf_trace_lock_acquire+0x4f1/0x980 [ 80.656661] alloc_vfsmnt+0xe0/0x9d0 [ 80.699925] ? mnt_free_id.isra.27+0x60/0x60 [ 80.704340] ? kasan_check_read+0x11/0x20 [ 80.708487] ? graph_lock+0x170/0x170 [ 80.712291] ? rcu_pm_notify+0xc0/0xc0 [ 80.716177] ? trace_hardirqs_off+0xd/0x10 [ 80.720418] ? putname+0xf2/0x130 [ 80.723876] ? putname+0xf2/0x130 [ 80.727332] ? find_held_lock+0x36/0x1c0 [ 80.731412] ? lock_downgrade+0x8e0/0x8e0 [ 80.735561] ? module_unload_free+0x5b0/0x5b0 [ 80.740063] ? lock_release+0xa10/0xa10 [ 80.744048] ? mpi_free.cold.1+0x19/0x19 [ 80.748114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.753659] vfs_kern_mount.part.34+0x88/0x4d0 [ 80.758247] ? may_umount+0xb0/0xb0 [ 80.761877] ? _raw_read_unlock+0x22/0x30 [ 80.766027] ? __get_fs_type+0x97/0xc0 [ 80.769929] do_mount+0x564/0x3070 [ 80.773471] ? interrupt_entry+0xb1/0xf0 [ 80.777543] ? copy_mount_string+0x40/0x40 [ 80.781781] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 80.786545] ? retint_kernel+0x10/0x10 [ 80.790442] ? copy_mount_options+0x1e3/0x380 [ 80.794941] ? audit_kill_trees+0x430/0x430 [ 80.799268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 80.804806] ? copy_mount_options+0x285/0x380 [ 80.809309] ksys_mount+0x12d/0x140 [ 80.812941] SyS_mount+0x35/0x50 [ 80.816308] ? ksys_mount+0x140/0x140 [ 80.820112] do_syscall_64+0x29e/0x9d0 [ 80.823997] ? vmalloc_sync_all+0x30/0x30 [ 80.828145] ? _raw_spin_unlock_irq+0x27/0x70 [ 80.832642] ? finish_task_switch+0x1ca/0x820 [ 80.837138] ? syscall_return_slowpath+0x5c0/0x5c0 [ 80.842071] ? syscall_return_slowpath+0x30f/0x5c0 [ 80.847006] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 80.852381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 80.857236] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/12 00:58:11 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:11 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:11 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 80.862420] RIP: 0033:0x455279 [ 80.865606] RSP: 002b:00007f906ca3cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 80.873317] RAX: ffffffffffffffda RBX: 00007f906ca3d6d4 RCX: 0000000000455279 [ 80.880582] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 80.887849] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 80.895121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 80.902386] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 2018/04/12 00:58:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 80.909688] CPU: 0 PID: 8367 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 80.916546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.925908] Call Trace: [ 80.928512] dump_stack+0x1b9/0x294 [ 80.932158] ? dump_stack_print_info.cold.2+0x52/0x52 [ 80.937382] should_fail.cold.4+0xa/0x1a [ 80.941468] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 80.946595] ? lock_downgrade+0x8e0/0x8e0 [ 80.950761] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 80.956318] ? proc_fail_nth_write+0x96/0x1f0 [ 80.960834] ? proc_cwd_link+0x1d0/0x1d0 [ 80.964917] ? find_held_lock+0x36/0x1c0 [ 80.969039] ? check_same_owner+0x320/0x320 [ 80.973372] ? __lock_is_held+0xb5/0x140 [ 80.977446] ? rcu_note_context_switch+0x710/0x710 [ 80.982396] __should_failslab+0x124/0x180 [ 80.986642] should_failslab+0x9/0x14 [ 80.990452] __kmalloc_track_caller+0x2c4/0x760 [ 80.995140] ? strncpy_from_user+0x500/0x500 [ 80.999562] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 81.005112] ? strndup_user+0x77/0xd0 [ 81.008934] memdup_user+0x2c/0xa0 [ 81.012500] strndup_user+0x77/0xd0 [ 81.016148] ksys_mount+0x3c/0x140 [ 81.019714] SyS_mount+0x35/0x50 [ 81.023092] ? ksys_mount+0x140/0x140 [ 81.026902] do_syscall_64+0x29e/0x9d0 [ 81.030781] ? vmalloc_sync_all+0x30/0x30 [ 81.034920] ? _raw_spin_unlock_irq+0x27/0x70 [ 81.039410] ? finish_task_switch+0x1ca/0x820 [ 81.043899] ? syscall_return_slowpath+0x5c0/0x5c0 [ 81.048824] ? syscall_return_slowpath+0x30f/0x5c0 [ 81.053751] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 81.059113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 81.063952] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 81.069133] RIP: 0033:0x455279 [ 81.072311] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 81.080016] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 81.087277] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 81.094599] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 81.101858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 81.109118] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 2018/04/12 00:58:11 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='//file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:11 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:11 executing program 5 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:11 executing program 1 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:12 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:12 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 81.298455] FAULT_INJECTION: forcing a failure. [ 81.298455] name failslab, interval 1, probability 0, space 0, times 0 [ 81.302610] FAULT_INJECTION: forcing a failure. [ 81.302610] name failslab, interval 1, probability 0, space 0, times 0 [ 81.309791] CPU: 0 PID: 8390 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 81.327772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.337125] Call Trace: [ 81.339718] dump_stack+0x1b9/0x294 [ 81.343352] ? dump_stack_print_info.cold.2+0x52/0x52 [ 81.348548] ? perf_tp_event+0xc30/0xc30 [ 81.352625] should_fail.cold.4+0xa/0x1a [ 81.356696] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 81.361804] ? perf_trace_lock_acquire+0x4f1/0x980 [ 81.366755] ? find_held_lock+0x36/0x1c0 [ 81.370861] ? check_same_owner+0x320/0x320 [ 81.375193] ? rcu_note_context_switch+0x710/0x710 [ 81.380132] __should_failslab+0x124/0x180 [ 81.384369] should_failslab+0x9/0x14 [ 81.388169] __kmalloc_track_caller+0x2c4/0x760 [ 81.392842] ? kasan_check_read+0x11/0x20 [ 81.396993] ? do_raw_spin_unlock+0x9e/0x2e0 [ 81.401405] ? kstrdup_const+0x66/0x80 [ 81.405296] kstrdup+0x39/0x70 [ 81.408491] kstrdup_const+0x66/0x80 [ 81.412208] alloc_vfsmnt+0x1b3/0x9d0 [ 81.416012] ? mnt_free_id.isra.27+0x60/0x60 [ 81.420423] ? kasan_check_read+0x11/0x20 [ 81.424573] ? graph_lock+0x170/0x170 [ 81.428373] ? rcu_pm_notify+0xc0/0xc0 [ 81.432258] ? trace_hardirqs_off+0xd/0x10 [ 81.436494] ? putname+0xf2/0x130 [ 81.439955] ? putname+0xf2/0x130 [ 81.443412] ? find_held_lock+0x36/0x1c0 [ 81.447493] ? lock_downgrade+0x8e0/0x8e0 [ 81.451642] ? module_unload_free+0x5b0/0x5b0 [ 81.456139] ? lock_release+0xa10/0xa10 [ 81.460116] ? mpi_free.cold.1+0x19/0x19 [ 81.464182] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 81.469726] vfs_kern_mount.part.34+0x88/0x4d0 [ 81.474316] ? may_umount+0xb0/0xb0 [ 81.477944] ? _raw_read_unlock+0x22/0x30 [ 81.482096] ? __get_fs_type+0x97/0xc0 [ 81.485996] do_mount+0x564/0x3070 [ 81.489549] ? copy_mount_string+0x40/0x40 [ 81.493787] ? rcu_pm_notify+0xc0/0xc0 [ 81.497689] ? copy_mount_options+0x5f/0x380 [ 81.502095] ? rcu_read_lock_sched_held+0x108/0x120 [ 81.507109] ? kmem_cache_alloc_trace+0x616/0x780 [ 81.511971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 81.517509] ? _copy_from_user+0xdf/0x150 [ 81.521663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 81.527198] ? copy_mount_options+0x285/0x380 [ 81.531702] ksys_mount+0x12d/0x140 [ 81.535333] SyS_mount+0x35/0x50 [ 81.538697] ? ksys_mount+0x140/0x140 [ 81.542500] do_syscall_64+0x29e/0x9d0 [ 81.546384] ? vmalloc_sync_all+0x30/0x30 [ 81.550529] ? _raw_spin_unlock_irq+0x27/0x70 [ 81.555028] ? finish_task_switch+0x1ca/0x820 [ 81.559528] ? syscall_return_slowpath+0x5c0/0x5c0 [ 81.564462] ? syscall_return_slowpath+0x30f/0x5c0 [ 81.569406] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 81.574782] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 81.579637] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 81.584826] RIP: 0033:0x455279 [ 81.588017] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 81.595738] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 81.603005] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 81.610273] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 81.617537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 81.624802] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 [ 81.632105] CPU: 1 PID: 8391 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 81.638956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.648317] Call Trace: [ 81.650923] dump_stack+0x1b9/0x294 [ 81.654578] ? dump_stack_print_info.cold.2+0x52/0x52 [ 81.659800] should_fail.cold.4+0xa/0x1a [ 81.663887] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 81.669018] ? lock_downgrade+0x8e0/0x8e0 [ 81.673198] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 81.678727] ? proc_fail_nth_write+0x96/0x1f0 [ 81.683214] ? proc_cwd_link+0x1d0/0x1d0 [ 81.687280] ? find_held_lock+0x36/0x1c0 [ 81.691359] ? check_same_owner+0x320/0x320 [ 81.695668] ? __lock_is_held+0xb5/0x140 [ 81.699726] ? rcu_note_context_switch+0x710/0x710 [ 81.704654] __should_failslab+0x124/0x180 [ 81.708886] should_failslab+0x9/0x14 [ 81.712687] __kmalloc_track_caller+0x2c4/0x760 [ 81.717349] ? strncpy_from_user+0x500/0x500 [ 81.721750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 81.727280] ? strndup_user+0x77/0xd0 [ 81.731076] memdup_user+0x2c/0xa0 [ 81.734612] strndup_user+0x77/0xd0 [ 81.738239] ksys_mount+0x3c/0x140 [ 81.741776] SyS_mount+0x35/0x50 [ 81.745130] ? ksys_mount+0x140/0x140 [ 81.748925] do_syscall_64+0x29e/0x9d0 [ 81.752804] ? vmalloc_sync_all+0x30/0x30 [ 81.756940] ? _raw_spin_unlock_irq+0x27/0x70 [ 81.761431] ? finish_task_switch+0x1ca/0x820 [ 81.765919] ? syscall_return_slowpath+0x5c0/0x5c0 [ 81.770840] ? syscall_return_slowpath+0x30f/0x5c0 [ 81.775766] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 81.781129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 81.785968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 81.792706] RIP: 0033:0x455279 [ 81.795883] RSP: 002b:00007f28b136cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 81.803586] RAX: ffffffffffffffda RBX: 00007f28b136d6d4 RCX: 0000000000455279 [ 81.810846] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 81.818103] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 81.825358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 81.832614] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 2018/04/12 00:58:12 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:12 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:12 executing program 1 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:12 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x0, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 81.970754] FAULT_INJECTION: forcing a failure. [ 81.970754] name failslab, interval 1, probability 0, space 0, times 0 [ 81.982087] CPU: 1 PID: 8406 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 81.988933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 81.994722] FAULT_INJECTION: forcing a failure. [ 81.994722] name failslab, interval 1, probability 0, space 0, times 0 [ 81.998286] Call Trace: [ 81.998311] dump_stack+0x1b9/0x294 [ 81.998335] ? dump_stack_print_info.cold.2+0x52/0x52 [ 81.998350] ? perf_trace_lock_acquire+0xe3/0x980 [ 81.998366] ? kernel_text_address+0x79/0xf0 [ 81.998381] ? __unwind_start+0x166/0x330 [ 81.998406] ? __kernel_text_address+0xd/0x40 [ 82.038750] should_fail.cold.4+0xa/0x1a [ 82.042812] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 82.047911] ? perf_trace_lock_acquire+0xe3/0x980 [ 82.052753] ? save_stack+0x43/0xd0 [ 82.056379] ? find_held_lock+0x36/0x1c0 [ 82.060457] ? check_same_owner+0x320/0x320 [ 82.064778] ? rcu_note_context_switch+0x710/0x710 [ 82.069706] __should_failslab+0x124/0x180 [ 82.073934] should_failslab+0x9/0x14 [ 82.077732] __kmalloc_track_caller+0x2c4/0x760 [ 82.082397] ? kasan_check_read+0x11/0x20 [ 82.086537] ? do_raw_spin_unlock+0x9e/0x2e0 [ 82.090939] ? kstrdup_const+0x66/0x80 [ 82.094820] kstrdup+0x39/0x70 [ 82.098005] kstrdup_const+0x66/0x80 [ 82.101716] alloc_vfsmnt+0x1b3/0x9d0 [ 82.105510] ? mnt_free_id.isra.27+0x60/0x60 [ 82.109912] ? kasan_check_read+0x11/0x20 [ 82.114053] ? graph_lock+0x170/0x170 [ 82.117846] ? rcu_pm_notify+0xc0/0xc0 [ 82.121724] ? trace_hardirqs_off+0xd/0x10 [ 82.125956] ? putname+0xf2/0x130 [ 82.129405] ? putname+0xf2/0x130 [ 82.132850] ? find_held_lock+0x36/0x1c0 [ 82.136911] ? lock_downgrade+0x8e0/0x8e0 [ 82.141053] ? module_unload_free+0x5b0/0x5b0 [ 82.145543] ? lock_release+0xa10/0xa10 [ 82.149515] ? mpi_free.cold.1+0x19/0x19 [ 82.153572] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.159104] vfs_kern_mount.part.34+0x88/0x4d0 [ 82.163683] ? may_umount+0xb0/0xb0 [ 82.167303] ? _raw_read_unlock+0x22/0x30 [ 82.171443] ? __get_fs_type+0x97/0xc0 [ 82.175327] do_mount+0x564/0x3070 [ 82.178864] ? copy_mount_string+0x40/0x40 [ 82.183089] ? rcu_pm_notify+0xc0/0xc0 [ 82.186973] ? copy_mount_options+0x5f/0x380 [ 82.191381] ? rcu_read_lock_sched_held+0x108/0x120 [ 82.196392] ? kmem_cache_alloc_trace+0x616/0x780 [ 82.201229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 82.206761] ? _copy_from_user+0xdf/0x150 [ 82.210906] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.216431] ? copy_mount_options+0x285/0x380 [ 82.220932] ksys_mount+0x12d/0x140 [ 82.224552] SyS_mount+0x35/0x50 [ 82.227911] ? ksys_mount+0x140/0x140 [ 82.231707] do_syscall_64+0x29e/0x9d0 [ 82.235586] ? vmalloc_sync_all+0x30/0x30 [ 82.239727] ? _raw_spin_unlock_irq+0x27/0x70 [ 82.244216] ? finish_task_switch+0x1ca/0x820 [ 82.248706] ? syscall_return_slowpath+0x5c0/0x5c0 [ 82.253628] ? syscall_return_slowpath+0x30f/0x5c0 [ 82.258551] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 82.263910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 82.268749] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 82.273931] RIP: 0033:0x455279 [ 82.277109] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 82.284809] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 82.292071] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 82.299333] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 82.306592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 82.313850] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000006 [ 82.321133] CPU: 0 PID: 8411 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 82.327982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.337335] Call Trace: [ 82.339941] dump_stack+0x1b9/0x294 [ 82.343590] ? dump_stack_print_info.cold.2+0x52/0x52 [ 82.348815] should_fail.cold.4+0xa/0x1a [ 82.352902] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 82.358019] ? save_stack+0x43/0xd0 [ 82.361661] ? kasan_kmalloc+0xc4/0xe0 [ 82.365559] ? __kmalloc_track_caller+0x14a/0x760 [ 82.370413] ? memdup_user+0x2c/0xa0 [ 82.374144] ? strndup_user+0x77/0xd0 [ 82.377957] ? graph_lock+0x170/0x170 [ 82.381778] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 82.387157] ? __sched_text_start+0x8/0x8 [ 82.391317] ? proc_fail_nth_write+0x96/0x1f0 [ 82.395838] ? find_held_lock+0x36/0x1c0 [ 82.399960] ? check_same_owner+0x320/0x320 [ 82.404293] ? lock_release+0xa10/0xa10 [ 82.408285] ? rcu_note_context_switch+0x710/0x710 [ 82.413226] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 82.418254] ? __check_object_size+0x95/0x5d9 [ 82.422775] __should_failslab+0x124/0x180 [ 82.427030] should_failslab+0x9/0x14 [ 82.430846] __kmalloc_track_caller+0x2c4/0x760 [ 82.435541] ? strncpy_from_user+0x500/0x500 [ 82.439966] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 82.445520] ? strndup_user+0x77/0xd0 [ 82.449345] memdup_user+0x2c/0xa0 [ 82.452908] strndup_user+0x77/0xd0 [ 82.456543] ksys_mount+0x73/0x140 [ 82.460104] SyS_mount+0x35/0x50 [ 82.463547] ? ksys_mount+0x140/0x140 [ 82.467342] do_syscall_64+0x29e/0x9d0 [ 82.471220] ? vmalloc_sync_all+0x30/0x30 [ 82.475361] ? _raw_spin_unlock_irq+0x27/0x70 [ 82.479850] ? finish_task_switch+0x1ca/0x820 [ 82.484341] ? syscall_return_slowpath+0x5c0/0x5c0 [ 82.489262] ? syscall_return_slowpath+0x30f/0x5c0 [ 82.494189] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 82.499635] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 82.504476] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 82.509653] RIP: 0033:0x455279 [ 82.512831] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 82.520546] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 82.527803] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 82.535062] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 82.542319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 82.549576] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 2018/04/12 00:58:13 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='//file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:13 executing program 6: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:13 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x0, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:13 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:13 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='.//ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:13 executing program 1 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:13 executing program 5 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:13 executing program 3 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 82.680803] FAULT_INJECTION: forcing a failure. [ 82.680803] name failslab, interval 1, probability 0, space 0, times 0 [ 82.687898] FAULT_INJECTION: forcing a failure. [ 82.687898] name failslab, interval 1, probability 0, space 0, times 0 [ 82.692369] CPU: 0 PID: 8424 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 82.692408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 82.719757] Call Trace: [ 82.722352] dump_stack+0x1b9/0x294 [ 82.725988] ? dump_stack_print_info.cold.2+0x52/0x52 [ 82.731200] should_fail.cold.4+0xa/0x1a [ 82.735269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 82.740377] ? graph_lock+0x170/0x170 [ 82.744177] ? wait_for_completion+0x870/0x870 [ 82.748774] ? graph_lock+0x170/0x170 [ 82.752576] ? find_next_zero_bit+0x111/0x140 [ 82.757080] ? find_held_lock+0x36/0x1c0 [ 82.761152] ? __lock_is_held+0xb5/0x140 [ 82.765238] ? check_same_owner+0x320/0x320 [ 82.769560] ? __might_sleep+0x95/0x190 [ 82.773537] ? rcu_note_context_switch+0x710/0x710 [ 82.778477] __should_failslab+0x124/0x180 [ 82.782716] should_failslab+0x9/0x14 [ 82.786519] __kmalloc+0x2c8/0x760 [ 82.790057] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 82.795077] ? __lockdep_init_map+0x105/0x590 [ 82.799577] ? __list_lru_init+0xdd/0x790 [ 82.803737] __list_lru_init+0xdd/0x790 [ 82.807719] ? list_lru_destroy+0x4c0/0x4c0 [ 82.812042] ? mark_held_locks+0xc9/0x160 [ 82.816194] ? __raw_spin_lock_init+0x1c/0x100 [ 82.820778] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 82.825794] ? __lockdep_init_map+0x105/0x590 [ 82.830298] ? lockdep_init_map+0x9/0x10 [ 82.834363] sget_userns+0x6d9/0xf20 [ 82.838075] ? set_anon_super+0x20/0x20 [ 82.842055] ? get_empty_filp.cold.7+0x3e/0x3e [ 82.846640] ? destroy_unused_super.part.9+0x100/0x100 [ 82.851923] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 82.856946] ? kasan_check_read+0x11/0x20 [ 82.861096] ? rcu_pm_notify+0xc0/0xc0 [ 82.864980] ? trace_hardirqs_off+0xd/0x10 [ 82.869218] ? cap_capable+0x1f9/0x260 [ 82.873115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.878652] ? security_capable+0x99/0xc0 [ 82.882806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.888347] ? ns_capable_common+0x13f/0x170 [ 82.892761] mount_ns+0x8f/0x1d0 [ 82.896127] ? rpc_pipe_release+0xb70/0xb70 [ 82.900453] rpc_mount+0x9e/0xd0 [ 82.903827] mount_fs+0xae/0x328 [ 82.907206] vfs_kern_mount.part.34+0xd4/0x4d0 [ 82.911795] ? may_umount+0xb0/0xb0 [ 82.915422] ? _raw_read_unlock+0x22/0x30 [ 82.919570] ? __get_fs_type+0x97/0xc0 [ 82.923465] do_mount+0x564/0x3070 [ 82.927016] ? copy_mount_string+0x40/0x40 [ 82.931269] ? rcu_pm_notify+0xc0/0xc0 [ 82.935169] ? copy_mount_options+0x5f/0x380 [ 82.939575] ? rcu_read_lock_sched_held+0x108/0x120 [ 82.944593] ? kmem_cache_alloc_trace+0x616/0x780 [ 82.949439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 82.954977] ? _copy_from_user+0xdf/0x150 [ 82.959132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 82.964666] ? copy_mount_options+0x285/0x380 [ 82.969168] ksys_mount+0x12d/0x140 [ 82.972800] SyS_mount+0x35/0x50 [ 82.976171] ? ksys_mount+0x140/0x140 [ 82.980073] do_syscall_64+0x29e/0x9d0 [ 82.983957] ? vmalloc_sync_all+0x30/0x30 [ 82.988105] ? kasan_check_write+0x14/0x20 [ 82.992344] ? syscall_return_slowpath+0x5c0/0x5c0 [ 82.997275] ? syscall_return_slowpath+0x30f/0x5c0 [ 83.002210] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 83.007583] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.012438] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 83.017624] RIP: 0033:0x455279 [ 83.020816] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 83.028526] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 83.035790] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 83.043060] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 83.050325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 83.057589] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000007 [ 83.064888] CPU: 1 PID: 8429 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 83.071742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.080500] FAULT_INJECTION: forcing a failure. [ 83.080500] name failslab, interval 1, probability 0, space 0, times 0 [ 83.081123] Call Trace: [ 83.081149] dump_stack+0x1b9/0x294 [ 83.081176] ? dump_stack_print_info.cold.2+0x52/0x52 [ 83.081216] should_fail.cold.4+0xa/0x1a [ 83.107804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 83.112909] ? kasan_kmalloc+0xc4/0xe0 [ 83.116795] ? __kmalloc_track_caller+0x14a/0x760 [ 83.121640] ? memdup_user+0x2c/0xa0 [ 83.125351] ? strndup_user+0x77/0xd0 [ 83.129151] ? graph_lock+0x170/0x170 [ 83.132955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 83.138491] ? proc_fail_nth_write+0x96/0x1f0 [ 83.142999] ? find_held_lock+0x36/0x1c0 [ 83.147101] ? check_same_owner+0x320/0x320 [ 83.151420] ? lock_release+0xa10/0xa10 [ 83.155399] ? rcu_note_context_switch+0x710/0x710 [ 83.160326] ? __check_object_size+0x95/0x5d9 [ 83.164830] __should_failslab+0x124/0x180 [ 83.169068] should_failslab+0x9/0x14 [ 83.172867] kmem_cache_alloc_trace+0x2cb/0x780 [ 83.177543] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.183079] ? _copy_from_user+0xdf/0x150 [ 83.187233] copy_mount_options+0x5f/0x380 [ 83.191467] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.197009] ksys_mount+0xd0/0x140 [ 83.200557] SyS_mount+0x35/0x50 [ 83.203918] ? ksys_mount+0x140/0x140 [ 83.207722] do_syscall_64+0x29e/0x9d0 [ 83.211612] ? vmalloc_sync_all+0x30/0x30 [ 83.215758] ? _raw_spin_unlock_irq+0x27/0x70 [ 83.220253] ? finish_task_switch+0x1ca/0x820 [ 83.224750] ? syscall_return_slowpath+0x5c0/0x5c0 [ 83.229686] ? syscall_return_slowpath+0x30f/0x5c0 [ 83.234624] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 83.239999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.244854] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 83.250042] RIP: 0033:0x455279 [ 83.253229] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 83.260942] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 83.268211] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 83.275480] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 2018/04/12 00:58:14 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 83.282745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 83.290012] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 [ 83.297319] CPU: 0 PID: 8427 Comm: syz-executor5 Not tainted 4.16.0+ #17 [ 83.304173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.313536] Call Trace: [ 83.316144] dump_stack+0x1b9/0x294 [ 83.319801] ? dump_stack_print_info.cold.2+0x52/0x52 [ 83.325029] should_fail.cold.4+0xa/0x1a 2018/04/12 00:58:14 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:14 executing program 1 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 83.329114] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 83.334236] ? save_stack+0x43/0xd0 [ 83.337884] ? kasan_kmalloc+0xc4/0xe0 [ 83.341791] ? __kmalloc_track_caller+0x14a/0x760 [ 83.346648] ? memdup_user+0x2c/0xa0 [ 83.350366] ? strndup_user+0x77/0xd0 [ 83.354179] ? graph_lock+0x170/0x170 [ 83.357996] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 83.363818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 83.369376] ? proc_fail_nth_write+0x96/0x1f0 [ 83.373901] ? find_held_lock+0x36/0x1c0 [ 83.378025] ? check_same_owner+0x320/0x320 [ 83.382368] ? lock_release+0xa10/0xa10 [ 83.386361] ? rcu_note_context_switch+0x710/0x710 [ 83.391305] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 83.396339] ? __check_object_size+0x95/0x5d9 [ 83.400859] __should_failslab+0x124/0x180 [ 83.405113] should_failslab+0x9/0x14 [ 83.408933] __kmalloc_track_caller+0x2c4/0x760 [ 83.413626] ? strncpy_from_user+0x500/0x500 [ 83.418062] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.423615] ? strndup_user+0x77/0xd0 [ 83.427440] memdup_user+0x2c/0xa0 [ 83.430997] strndup_user+0x77/0xd0 [ 83.434644] ksys_mount+0x73/0x140 [ 83.438204] SyS_mount+0x35/0x50 [ 83.441585] ? ksys_mount+0x140/0x140 [ 83.445410] do_syscall_64+0x29e/0x9d0 [ 83.449314] ? vmalloc_sync_all+0x30/0x30 [ 83.453472] ? _raw_spin_unlock_irq+0x27/0x70 [ 83.457982] ? finish_task_switch+0x1ca/0x820 [ 83.462495] ? syscall_return_slowpath+0x5c0/0x5c0 [ 83.467437] ? syscall_return_slowpath+0x30f/0x5c0 [ 83.472390] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 83.477784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.482658] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 83.487859] RIP: 0033:0x455279 [ 83.491054] RSP: 002b:00007f28b136cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 83.498790] RAX: ffffffffffffffda RBX: 00007f28b136d6d4 RCX: 0000000000455279 [ 83.506075] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 83.513354] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 83.520632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 83.527906] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 [ 83.603711] FAULT_INJECTION: forcing a failure. [ 83.603711] name failslab, interval 1, probability 0, space 0, times 0 [ 83.615224] CPU: 1 PID: 8456 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 83.622075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 83.631429] Call Trace: [ 83.634030] dump_stack+0x1b9/0x294 [ 83.637674] ? dump_stack_print_info.cold.2+0x52/0x52 [ 83.642877] ? perf_trace_lock_acquire+0xe3/0x980 [ 83.647740] should_fail.cold.4+0xa/0x1a [ 83.651813] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 83.656944] ? find_held_lock+0x36/0x1c0 [ 83.661035] ? check_same_owner+0x320/0x320 [ 83.665371] ? rcu_note_context_switch+0x710/0x710 [ 83.670305] __should_failslab+0x124/0x180 [ 83.674527] should_failslab+0x9/0x14 [ 83.678313] kmem_cache_alloc_trace+0x2cb/0x780 [ 83.682969] ? kasan_check_write+0x14/0x20 [ 83.687187] ? do_raw_spin_lock+0xc1/0x200 [ 83.691408] sget_userns+0x1c7/0xf20 [ 83.695104] ? set_anon_super+0x20/0x20 [ 83.699063] ? get_empty_filp.cold.7+0x3e/0x3e [ 83.703633] ? destroy_unused_super.part.9+0x100/0x100 [ 83.708896] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 83.713905] ? kasan_check_read+0x11/0x20 [ 83.718045] ? rcu_pm_notify+0xc0/0xc0 [ 83.721919] ? trace_hardirqs_off+0xd/0x10 [ 83.726140] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.731751] ? cap_capable+0x1f9/0x260 [ 83.735630] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.741154] ? security_capable+0x99/0xc0 [ 83.745290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.750810] ? ns_capable_common+0x13f/0x170 [ 83.755204] mount_ns+0x8f/0x1d0 [ 83.758559] ? rpc_pipe_release+0xb70/0xb70 [ 83.762867] rpc_mount+0x9e/0xd0 [ 83.766223] mount_fs+0xae/0x328 [ 83.769581] vfs_kern_mount.part.34+0xd4/0x4d0 [ 83.774149] ? may_umount+0xb0/0xb0 [ 83.777759] ? _raw_read_unlock+0x22/0x30 [ 83.781894] ? __get_fs_type+0x97/0xc0 [ 83.785767] do_mount+0x564/0x3070 [ 83.789291] ? do_raw_spin_unlock+0x9e/0x2e0 [ 83.793685] ? copy_mount_string+0x40/0x40 [ 83.797902] ? rcu_pm_notify+0xc0/0xc0 [ 83.801779] ? copy_mount_options+0x5f/0x380 [ 83.806169] ? rcu_read_lock_sched_held+0x108/0x120 [ 83.811169] ? kmem_cache_alloc_trace+0x616/0x780 [ 83.816001] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 83.821533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 83.827056] ? copy_mount_options+0x285/0x380 [ 83.831536] ksys_mount+0x12d/0x140 [ 83.835147] SyS_mount+0x35/0x50 [ 83.838496] ? ksys_mount+0x140/0x140 [ 83.842285] do_syscall_64+0x29e/0x9d0 [ 83.846159] ? vmalloc_sync_all+0x30/0x30 [ 83.850290] ? _raw_spin_unlock_irq+0x27/0x70 [ 83.854773] ? finish_task_switch+0x1ca/0x820 [ 83.859255] ? syscall_return_slowpath+0x5c0/0x5c0 [ 83.864169] ? syscall_return_slowpath+0x30f/0x5c0 [ 83.869083] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 83.874435] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 83.879266] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 83.884437] RIP: 0033:0x455279 [ 83.887610] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 83.895302] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 83.902557] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 83.909807] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 83.917060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 83.924311] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000008 2018/04/12 00:58:14 executing program 3 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:14 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='.//ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:14 executing program 6: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file#\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:14 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:14 executing program 0 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:14 executing program 1 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:14 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 84.042364] FAULT_INJECTION: forcing a failure. [ 84.042364] name failslab, interval 1, probability 0, space 0, times 0 [ 84.053750] CPU: 0 PID: 8471 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 84.060599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.069950] Call Trace: [ 84.072536] dump_stack+0x1b9/0x294 [ 84.076173] ? dump_stack_print_info.cold.2+0x52/0x52 [ 84.081377] should_fail.cold.4+0xa/0x1a [ 84.085437] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 84.090539] ? lock_downgrade+0x8e0/0x8e0 [ 84.094685] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 84.100218] ? proc_fail_nth_write+0x96/0x1f0 [ 84.104705] ? proc_cwd_link+0x1d0/0x1d0 [ 84.108765] ? find_held_lock+0x36/0x1c0 [ 84.112847] ? check_same_owner+0x320/0x320 [ 84.117160] ? __lock_is_held+0xb5/0x140 [ 84.121214] ? rcu_note_context_switch+0x710/0x710 [ 84.126142] __should_failslab+0x124/0x180 [ 84.130370] should_failslab+0x9/0x14 [ 84.134160] __kmalloc_track_caller+0x2c4/0x760 [ 84.138825] ? strncpy_from_user+0x500/0x500 [ 84.143223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 84.148750] ? strndup_user+0x77/0xd0 [ 84.152545] memdup_user+0x2c/0xa0 [ 84.156081] strndup_user+0x77/0xd0 [ 84.159700] ksys_mount+0x3c/0x140 [ 84.163235] SyS_mount+0x35/0x50 [ 84.166593] ? ksys_mount+0x140/0x140 [ 84.170388] do_syscall_64+0x29e/0x9d0 [ 84.174265] ? vmalloc_sync_all+0x30/0x30 [ 84.178406] ? _raw_spin_unlock_irq+0x27/0x70 [ 84.182894] ? finish_task_switch+0x1ca/0x820 [ 84.187385] ? syscall_return_slowpath+0x5c0/0x5c0 [ 84.192309] ? syscall_return_slowpath+0x30f/0x5c0 [ 84.197237] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 84.202597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 84.207436] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 84.212615] RIP: 0033:0x455279 [ 84.215791] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 84.223492] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 84.230748] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 84.238011] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 84.245276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 84.252533] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000000 [ 84.264659] FAULT_INJECTION: forcing a failure. [ 84.264659] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 84.276503] CPU: 0 PID: 8475 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 84.283356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/04/12 00:58:15 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 84.292727] Call Trace: [ 84.295341] dump_stack+0x1b9/0x294 [ 84.298992] ? dump_stack_print_info.cold.2+0x52/0x52 [ 84.304199] ? find_held_lock+0x36/0x1c0 [ 84.308291] should_fail.cold.4+0xa/0x1a [ 84.312380] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 84.317522] ? debug_check_no_locks_freed+0x310/0x310 [ 84.322745] ? perf_tp_event+0xc30/0xc30 [ 84.326834] ? perf_tp_event+0xc30/0xc30 [ 84.330923] ? memset+0x31/0x40 [ 84.334235] ? perf_trace_lock_acquire+0x4f1/0x980 [ 84.339205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.344759] ? should_fail+0x21b/0xbcd [ 84.348665] __alloc_pages_nodemask+0x34e/0xd70 [ 84.353324] ? memdup_user+0x2c/0xa0 [ 84.357037] ? strndup_user+0x77/0xd0 [ 84.360844] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 84.365861] ? find_held_lock+0x36/0x1c0 [ 84.369941] ? check_same_owner+0x320/0x320 [ 84.374252] ? lock_release+0xa10/0xa10 [ 84.378225] cache_grow_begin+0x72/0x6c0 [ 84.382284] kmem_cache_alloc_trace+0x6a5/0x780 [ 84.386951] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.392488] copy_mount_options+0x5f/0x380 [ 84.396719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.402250] ksys_mount+0xd0/0x140 [ 84.405783] SyS_mount+0x35/0x50 [ 84.409136] ? ksys_mount+0x140/0x140 [ 84.412932] do_syscall_64+0x29e/0x9d0 [ 84.416806] ? vmalloc_sync_all+0x30/0x30 [ 84.420946] ? _raw_spin_unlock_irq+0x27/0x70 [ 84.425436] ? finish_task_switch+0x1ca/0x820 [ 84.429926] ? syscall_return_slowpath+0x5c0/0x5c0 [ 84.434848] ? syscall_return_slowpath+0x30f/0x5c0 [ 84.439774] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 84.445136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 84.449976] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 84.455154] RIP: 0033:0x455279 [ 84.458334] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 84.466040] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 84.473296] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 84.480553] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 2018/04/12 00:58:15 executing program 0 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 84.487809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 84.495071] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 [ 84.527566] FAULT_INJECTION: forcing a failure. [ 84.527566] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 84.539401] CPU: 1 PID: 8485 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 84.546241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.555598] Call Trace: [ 84.558206] dump_stack+0x1b9/0x294 [ 84.561849] ? dump_stack_print_info.cold.2+0x52/0x52 [ 84.567049] ? graph_lock+0x170/0x170 [ 84.570867] should_fail.cold.4+0xa/0x1a [ 84.574939] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 84.580056] ? debug_check_no_locks_freed+0x310/0x310 [ 84.581227] FAULT_INJECTION: forcing a failure. [ 84.581227] name failslab, interval 1, probability 0, space 0, times 0 [ 84.585262] ? pcpu_next_fit_region.constprop.23+0x334/0x410 [ 84.585290] ? perf_trace_lock_acquire+0xe3/0x980 [ 84.585319] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.585336] ? should_fail+0x21b/0xbcd [ 84.585363] __alloc_pages_nodemask+0x34e/0xd70 [ 84.621185] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 84.626205] ? find_held_lock+0x36/0x1c0 [ 84.630283] ? check_same_owner+0x320/0x320 [ 84.634603] cache_grow_begin+0x72/0x6c0 [ 84.638663] kmem_cache_alloc_trace+0x6a5/0x780 [ 84.643327] ? kasan_check_write+0x14/0x20 [ 84.647554] ? do_raw_spin_lock+0xc1/0x200 [ 84.651788] sget_userns+0x1c7/0xf20 [ 84.655492] ? set_anon_super+0x20/0x20 [ 84.659461] ? get_empty_filp.cold.7+0x3e/0x3e [ 84.664039] ? destroy_unused_super.part.9+0x100/0x100 [ 84.669314] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 84.674327] ? kasan_check_read+0x11/0x20 [ 84.678470] ? rcu_pm_notify+0xc0/0xc0 [ 84.682353] ? trace_hardirqs_off+0xd/0x10 [ 84.686589] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.692119] ? cap_capable+0x1f9/0x260 [ 84.696006] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.701537] ? security_capable+0x99/0xc0 [ 84.705683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.711213] ? ns_capable_common+0x13f/0x170 [ 84.715620] mount_ns+0x8f/0x1d0 [ 84.718979] ? rpc_pipe_release+0xb70/0xb70 [ 84.723295] rpc_mount+0x9e/0xd0 [ 84.726659] mount_fs+0xae/0x328 [ 84.730028] vfs_kern_mount.part.34+0xd4/0x4d0 [ 84.734609] ? may_umount+0xb0/0xb0 [ 84.738229] ? _raw_read_unlock+0x22/0x30 [ 84.742370] ? __get_fs_type+0x97/0xc0 [ 84.746255] do_mount+0x564/0x3070 [ 84.749787] ? do_raw_spin_unlock+0x9e/0x2e0 [ 84.754193] ? copy_mount_string+0x40/0x40 [ 84.758418] ? rcu_pm_notify+0xc0/0xc0 [ 84.762305] ? copy_mount_options+0x5f/0x380 [ 84.766705] ? rcu_read_lock_sched_held+0x108/0x120 [ 84.771717] ? kmem_cache_alloc_trace+0x616/0x780 [ 84.776555] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.782088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 84.787614] ? copy_mount_options+0x285/0x380 [ 84.792106] ksys_mount+0x12d/0x140 [ 84.795729] SyS_mount+0x35/0x50 [ 84.799084] ? ksys_mount+0x140/0x140 [ 84.802878] do_syscall_64+0x29e/0x9d0 [ 84.806755] ? vmalloc_sync_all+0x30/0x30 [ 84.810896] ? _raw_spin_unlock_irq+0x27/0x70 [ 84.815383] ? finish_task_switch+0x1ca/0x820 [ 84.819874] ? syscall_return_slowpath+0x5c0/0x5c0 [ 84.824803] ? syscall_return_slowpath+0x30f/0x5c0 [ 84.829727] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 84.835089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 84.839928] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/12 00:58:15 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='//file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 84.845110] RIP: 0033:0x455279 [ 84.848289] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 84.855994] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 84.863257] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 84.870520] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 84.877778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 84.885038] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000009 [ 84.892323] CPU: 0 PID: 8490 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 84.899173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 84.908535] Call Trace: [ 84.911141] dump_stack+0x1b9/0x294 [ 84.914792] ? dump_stack_print_info.cold.2+0x52/0x52 [ 84.919998] ? finish_task_switch+0x1ca/0x820 [ 84.924505] ? finish_task_switch+0x182/0x820 [ 84.929034] should_fail.cold.4+0xa/0x1a [ 84.933117] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 84.938248] ? __schedule+0x80f/0x1e40 [ 84.942161] ? __sched_text_start+0x8/0x8 2018/04/12 00:58:15 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 84.946317] ? find_held_lock+0x36/0x1c0 [ 84.950428] ? check_same_owner+0x320/0x320 [ 84.954760] ? lock_release+0xa10/0xa10 [ 84.958753] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 84.963785] ? __check_object_size+0x95/0x5d9 [ 84.968307] __should_failslab+0x124/0x180 [ 84.972561] should_failslab+0x9/0x14 [ 84.976374] __kmalloc_track_caller+0x2c4/0x760 [ 84.981067] ? strncpy_from_user+0x500/0x500 [ 84.985495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 84.991046] ? strndup_user+0x77/0xd0 2018/04/12 00:58:15 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 84.994872] memdup_user+0x2c/0xa0 [ 84.998426] strndup_user+0x77/0xd0 [ 85.002066] ksys_mount+0x73/0x140 [ 85.005626] SyS_mount+0x35/0x50 [ 85.009008] ? ksys_mount+0x140/0x140 [ 85.012829] do_syscall_64+0x29e/0x9d0 [ 85.016732] ? vmalloc_sync_all+0x30/0x30 [ 85.020894] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 85.025758] ? syscall_return_slowpath+0x5c0/0x5c0 [ 85.030706] ? syscall_return_slowpath+0x30f/0x5c0 [ 85.035666] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 85.041060] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/12 00:58:15 executing program 1 (fault-call:5 fault-nth:10): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 85.045930] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 85.051129] RIP: 0033:0x455279 [ 85.054326] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 85.062053] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 85.069330] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 85.076611] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 85.083893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 85.091173] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000001 [ 85.180474] FAULT_INJECTION: forcing a failure. [ 85.180474] name failslab, interval 1, probability 0, space 0, times 0 [ 85.191785] CPU: 1 PID: 8512 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 85.198624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.207965] Call Trace: [ 85.210542] dump_stack+0x1b9/0x294 [ 85.214159] ? dump_stack_print_info.cold.2+0x52/0x52 [ 85.219334] ? perf_trace_lock_acquire+0xe3/0x980 [ 85.224163] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 85.229346] should_fail.cold.4+0xa/0x1a [ 85.233398] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 85.238492] ? unwind_get_return_address+0x61/0xa0 [ 85.243412] ? __save_stack_trace+0x7e/0xd0 [ 85.247720] ? graph_lock+0x170/0x170 [ 85.251508] ? find_held_lock+0x36/0x1c0 [ 85.255557] ? __lock_is_held+0xb5/0x140 [ 85.259617] ? check_same_owner+0x320/0x320 [ 85.263929] ? rcu_note_context_switch+0x710/0x710 [ 85.268850] __should_failslab+0x124/0x180 [ 85.273070] should_failslab+0x9/0x14 [ 85.276858] kmem_cache_alloc_trace+0x2cb/0x780 [ 85.281512] ? __kmalloc_node+0x33/0x70 [ 85.285471] ? __kmalloc_node+0x33/0x70 [ 85.289431] ? rcu_read_lock_sched_held+0x108/0x120 [ 85.295568] __memcg_init_list_lru_node+0x17d/0x2c0 [ 85.300575] ? kvfree_rcu+0x20/0x20 [ 85.304190] ? __kmalloc_node+0x47/0x70 [ 85.308157] __list_lru_init+0x456/0x790 [ 85.312207] ? list_lru_destroy+0x4c0/0x4c0 [ 85.316514] ? mark_held_locks+0xc9/0x160 [ 85.321084] ? __raw_spin_lock_init+0x1c/0x100 [ 85.325652] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 85.330651] ? __lockdep_init_map+0x105/0x590 [ 85.335135] ? lockdep_init_map+0x9/0x10 [ 85.339185] sget_userns+0x6d9/0xf20 [ 85.342882] ? set_anon_super+0x20/0x20 [ 85.346843] ? get_empty_filp.cold.7+0x3e/0x3e [ 85.351409] ? destroy_unused_super.part.9+0x100/0x100 [ 85.356674] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 85.361676] ? kasan_check_read+0x11/0x20 [ 85.365813] ? rcu_pm_notify+0xc0/0xc0 [ 85.369684] ? trace_hardirqs_off+0xd/0x10 [ 85.373912] ? cap_capable+0x1f9/0x260 [ 85.377787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 85.383306] ? security_capable+0x99/0xc0 [ 85.387443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 85.392965] ? ns_capable_common+0x13f/0x170 [ 85.397358] mount_ns+0x8f/0x1d0 [ 85.400709] ? rpc_pipe_release+0xb70/0xb70 [ 85.405021] rpc_mount+0x9e/0xd0 [ 85.408378] mount_fs+0xae/0x328 [ 85.411737] vfs_kern_mount.part.34+0xd4/0x4d0 [ 85.416306] ? may_umount+0xb0/0xb0 [ 85.419915] ? _raw_read_unlock+0x22/0x30 [ 85.424047] ? __get_fs_type+0x97/0xc0 [ 85.427924] do_mount+0x564/0x3070 [ 85.431449] ? interrupt_entry+0xb1/0xf0 [ 85.435669] ? copy_mount_string+0x40/0x40 [ 85.439889] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 85.444635] ? retint_kernel+0x10/0x10 [ 85.448515] ? copy_mount_options+0x213/0x380 [ 85.452995] ? write_comp_data+0x22/0x70 [ 85.457048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 85.462567] ? copy_mount_options+0x285/0x380 [ 85.467049] ksys_mount+0x12d/0x140 [ 85.470661] SyS_mount+0x35/0x50 [ 85.474018] ? ksys_mount+0x140/0x140 [ 85.477809] do_syscall_64+0x29e/0x9d0 [ 85.481680] ? vmalloc_sync_all+0x30/0x30 [ 85.485810] ? _raw_spin_unlock_irq+0x27/0x70 [ 85.490294] ? finish_task_switch+0x1ca/0x820 [ 85.494773] ? syscall_return_slowpath+0x5c0/0x5c0 [ 85.499686] ? syscall_return_slowpath+0x30f/0x5c0 [ 85.504606] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 85.509957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.515180] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 85.520353] RIP: 0033:0x455279 [ 85.523525] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/04/12 00:58:16 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:16 executing program 3 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:16 executing program 0 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:16 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file+\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:16 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file#\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:16 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:16 executing program 1 (fault-call:5 fault-nth:11): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:16 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 85.531218] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 85.538472] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 85.545724] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 85.552978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 85.560230] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000a [ 85.647314] FAULT_INJECTION: forcing a failure. [ 85.647314] name failslab, interval 1, probability 0, space 0, times 0 [ 85.651351] FAULT_INJECTION: forcing a failure. [ 85.651351] name failslab, interval 1, probability 0, space 0, times 0 [ 85.658739] CPU: 0 PID: 8524 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 85.676640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.685994] Call Trace: [ 85.688593] dump_stack+0x1b9/0x294 [ 85.692228] ? dump_stack_print_info.cold.2+0x52/0x52 [ 85.697444] should_fail.cold.4+0xa/0x1a [ 85.701517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 85.706622] ? kasan_kmalloc+0xc4/0xe0 [ 85.710510] ? __kmalloc_track_caller+0x14a/0x760 [ 85.715353] ? memdup_user+0x2c/0xa0 [ 85.719068] ? strndup_user+0x77/0xd0 [ 85.722873] ? graph_lock+0x170/0x170 [ 85.726679] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 85.732219] ? proc_fail_nth_write+0x96/0x1f0 [ 85.736727] ? find_held_lock+0x36/0x1c0 [ 85.740823] ? check_same_owner+0x320/0x320 [ 85.745140] ? lock_release+0xa10/0xa10 [ 85.749119] ? rcu_note_context_switch+0x710/0x710 [ 85.754045] ? __check_object_size+0x95/0x5d9 [ 85.758550] __should_failslab+0x124/0x180 [ 85.762793] should_failslab+0x9/0x14 [ 85.766596] kmem_cache_alloc_trace+0x2cb/0x780 [ 85.771273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 85.776807] ? _copy_from_user+0xdf/0x150 [ 85.780962] copy_mount_options+0x5f/0x380 [ 85.785196] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 85.790737] ksys_mount+0xd0/0x140 [ 85.794282] SyS_mount+0x35/0x50 [ 85.797649] ? ksys_mount+0x140/0x140 [ 85.801455] do_syscall_64+0x29e/0x9d0 [ 85.805343] ? vmalloc_sync_all+0x30/0x30 [ 85.809492] ? kasan_check_write+0x14/0x20 [ 85.813730] ? syscall_return_slowpath+0x5c0/0x5c0 [ 85.818663] ? syscall_return_slowpath+0x30f/0x5c0 [ 85.823602] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 85.828977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 85.833829] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 85.839014] RIP: 0033:0x455279 [ 85.842211] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 85.849924] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 85.857191] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 85.864458] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 85.871729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 85.878995] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000002 [ 85.886297] CPU: 1 PID: 8521 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 85.893148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 85.902508] Call Trace: [ 85.905118] dump_stack+0x1b9/0x294 [ 85.908768] ? dump_stack_print_info.cold.2+0x52/0x52 [ 85.913974] ? find_held_lock+0x36/0x1c0 [ 85.918059] should_fail.cold.4+0xa/0x1a [ 85.920485] FAULT_INJECTION: forcing a failure. [ 85.920485] name failslab, interval 1, probability 0, space 0, times 0 [ 85.922144] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 85.922173] ? kasan_check_read+0x11/0x20 [ 85.922198] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 85.922227] ? find_held_lock+0x36/0x1c0 [ 85.922280] ? check_same_owner+0x320/0x320 [ 85.956175] ? rcu_note_context_switch+0x710/0x710 [ 85.961106] ? save_stack+0xa9/0xd0 [ 85.964743] __should_failslab+0x124/0x180 [ 85.968985] should_failslab+0x9/0x14 [ 85.972789] kmem_cache_alloc+0x2af/0x760 [ 85.976939] ? find_held_lock+0x36/0x1c0 [ 85.981016] getname_flags+0xd0/0x5a0 [ 85.984829] user_path_at_empty+0x2d/0x50 [ 85.988986] do_mount+0x172/0x3070 [ 85.992530] ? do_raw_spin_unlock+0x9e/0x2e0 [ 85.996948] ? copy_mount_string+0x40/0x40 [ 86.001182] ? rcu_pm_notify+0xc0/0xc0 [ 86.005093] ? copy_mount_options+0x5f/0x380 [ 86.009504] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.014521] ? kmem_cache_alloc_trace+0x616/0x780 [ 86.019374] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 86.024924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.030480] ? copy_mount_options+0x285/0x380 [ 86.034982] ksys_mount+0x12d/0x140 [ 86.038617] SyS_mount+0x35/0x50 [ 86.041983] ? ksys_mount+0x140/0x140 [ 86.045795] do_syscall_64+0x29e/0x9d0 [ 86.049684] ? vmalloc_sync_all+0x30/0x30 [ 86.053845] ? kasan_check_write+0x14/0x20 [ 86.058093] ? syscall_return_slowpath+0x5c0/0x5c0 [ 86.063031] ? syscall_return_slowpath+0x30f/0x5c0 [ 86.067978] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 86.073356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 86.078821] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 86.084011] RIP: 0033:0x455279 [ 86.087201] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 86.094916] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 86.102186] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 86.109457] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 86.116725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 86.124005] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 [ 86.131310] CPU: 0 PID: 8533 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 86.138162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 2018/04/12 00:58:16 executing program 0 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 86.147523] Call Trace: [ 86.150135] dump_stack+0x1b9/0x294 [ 86.153794] ? dump_stack_print_info.cold.2+0x52/0x52 [ 86.159005] ? __save_stack_trace+0x7e/0xd0 [ 86.163364] should_fail.cold.4+0xa/0x1a [ 86.167451] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 86.172582] ? save_stack+0x43/0xd0 [ 86.176218] ? kasan_kmalloc+0xc4/0xe0 [ 86.180116] ? kmem_cache_alloc_trace+0x152/0x780 [ 86.184979] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 86.190185] ? __list_lru_init+0x456/0x790 [ 86.194435] ? sget_userns+0x6d9/0xf20 [ 86.198344] ? graph_lock+0x170/0x170 [ 86.202154] ? do_mount+0x564/0x3070 [ 86.205877] ? ksys_mount+0x12d/0x140 [ 86.209687] ? SyS_mount+0x35/0x50 [ 86.213229] ? do_syscall_64+0x29e/0x9d0 [ 86.217289] ? find_held_lock+0x36/0x1c0 [ 86.221348] ? __lock_is_held+0xb5/0x140 [ 86.225421] ? check_same_owner+0x320/0x320 [ 86.229737] ? rcu_note_context_switch+0x710/0x710 [ 86.234665] __should_failslab+0x124/0x180 [ 86.238896] should_failslab+0x9/0x14 [ 86.242685] kmem_cache_alloc_trace+0x2cb/0x780 [ 86.247341] ? __kmalloc_node+0x33/0x70 [ 86.251304] ? __kmalloc_node+0x33/0x70 [ 86.255267] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.260283] __memcg_init_list_lru_node+0x17d/0x2c0 [ 86.265296] ? kvfree_rcu+0x20/0x20 [ 86.268915] ? __kmalloc_node+0x47/0x70 [ 86.272889] __list_lru_init+0x456/0x790 [ 86.276946] ? list_lru_destroy+0x4c0/0x4c0 [ 86.281257] ? mark_held_locks+0xc9/0x160 [ 86.285402] ? __raw_spin_lock_init+0x1c/0x100 [ 86.289975] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 86.294979] ? __lockdep_init_map+0x105/0x590 [ 86.299468] ? lockdep_init_map+0x9/0x10 [ 86.303522] sget_userns+0x6d9/0xf20 [ 86.307225] ? set_anon_super+0x20/0x20 [ 86.311195] ? get_empty_filp.cold.7+0x3e/0x3e [ 86.315767] ? destroy_unused_super.part.9+0x100/0x100 [ 86.321046] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 86.326057] ? kasan_check_read+0x11/0x20 [ 86.330198] ? rcu_pm_notify+0xc0/0xc0 [ 86.334073] ? trace_hardirqs_off+0xd/0x10 [ 86.338300] ? cap_capable+0x1f9/0x260 [ 86.342187] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.347716] ? security_capable+0x99/0xc0 [ 86.351857] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.357387] ? ns_capable_common+0x13f/0x170 [ 86.361792] mount_ns+0x8f/0x1d0 [ 86.365152] ? rpc_pipe_release+0xb70/0xb70 [ 86.369474] rpc_mount+0x9e/0xd0 [ 86.372836] mount_fs+0xae/0x328 [ 86.376201] vfs_kern_mount.part.34+0xd4/0x4d0 [ 86.380779] ? may_umount+0xb0/0xb0 [ 86.384395] ? _raw_read_unlock+0x22/0x30 [ 86.388536] ? __get_fs_type+0x97/0xc0 [ 86.392422] do_mount+0x564/0x3070 [ 86.395962] ? copy_mount_string+0x40/0x40 [ 86.400186] ? rcu_pm_notify+0xc0/0xc0 [ 86.404073] ? copy_mount_options+0x5f/0x380 [ 86.408470] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.413477] ? kmem_cache_alloc_trace+0x616/0x780 [ 86.418314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 86.423840] ? _copy_from_user+0xdf/0x150 [ 86.427982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.433508] ? copy_mount_options+0x285/0x380 [ 86.438002] ksys_mount+0x12d/0x140 [ 86.441631] SyS_mount+0x35/0x50 [ 86.444991] ? ksys_mount+0x140/0x140 [ 86.448791] do_syscall_64+0x29e/0x9d0 [ 86.452665] ? vmalloc_sync_all+0x30/0x30 [ 86.456812] ? _raw_spin_unlock_irq+0x27/0x70 [ 86.461299] ? finish_task_switch+0x1ca/0x820 [ 86.465787] ? syscall_return_slowpath+0x5c0/0x5c0 [ 86.470711] ? syscall_return_slowpath+0x30f/0x5c0 [ 86.475635] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 86.480995] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 86.485841] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 86.491022] RIP: 0033:0x455279 [ 86.494206] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 86.501905] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 86.509164] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 86.516424] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 86.523683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 86.530938] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000b 2018/04/12 00:58:17 executing program 3 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file+\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:17 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file-\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 86.619973] FAULT_INJECTION: forcing a failure. [ 86.619973] name failslab, interval 1, probability 0, space 0, times 0 [ 86.631688] CPU: 1 PID: 8539 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 86.638534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.647889] Call Trace: [ 86.650489] dump_stack+0x1b9/0x294 [ 86.654125] ? dump_stack_print_info.cold.2+0x52/0x52 [ 86.659320] ? perf_trace_lock_acquire+0xe3/0x980 [ 86.664177] ? find_held_lock+0x36/0x1c0 2018/04/12 00:58:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='.//ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:17 executing program 1 (fault-call:5 fault-nth:12): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:17 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x0, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 86.668255] should_fail.cold.4+0xa/0x1a [ 86.672337] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 86.677450] ? kasan_check_read+0x11/0x20 [ 86.681603] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 86.686809] ? find_held_lock+0x36/0x1c0 [ 86.690901] ? check_same_owner+0x320/0x320 [ 86.695235] ? rcu_note_context_switch+0x710/0x710 [ 86.700174] ? save_stack+0xa9/0xd0 [ 86.703816] __should_failslab+0x124/0x180 [ 86.708060] should_failslab+0x9/0x14 [ 86.711868] kmem_cache_alloc+0x2af/0x760 [ 86.716032] ? proc_cwd_link+0x1d0/0x1d0 [ 86.720119] getname_flags+0xd0/0x5a0 [ 86.723927] user_path_at_empty+0x2d/0x50 [ 86.728089] do_mount+0x172/0x3070 [ 86.731644] ? copy_mount_string+0x40/0x40 [ 86.735888] ? rcu_pm_notify+0xc0/0xc0 [ 86.739790] ? copy_mount_options+0x5f/0x380 [ 86.744207] ? rcu_read_lock_sched_held+0x108/0x120 [ 86.749233] ? kmem_cache_alloc_trace+0x616/0x780 [ 86.754085] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 86.759634] ? _copy_from_user+0xdf/0x150 [ 86.763794] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.769341] ? copy_mount_options+0x285/0x380 [ 86.773851] ksys_mount+0x12d/0x140 [ 86.777487] SyS_mount+0x35/0x50 [ 86.780860] ? ksys_mount+0x140/0x140 [ 86.784673] do_syscall_64+0x29e/0x9d0 [ 86.788563] ? vmalloc_sync_all+0x30/0x30 [ 86.792716] ? _raw_spin_unlock_irq+0x27/0x70 [ 86.797223] ? finish_task_switch+0x1ca/0x820 [ 86.801732] ? syscall_return_slowpath+0x5c0/0x5c0 [ 86.802880] FAULT_INJECTION: forcing a failure. [ 86.802880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 86.806671] ? syscall_return_slowpath+0x30f/0x5c0 [ 86.823359] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 86.828721] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 86.833558] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 86.838737] RIP: 0033:0x455279 [ 86.841916] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 86.849619] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 86.856875] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 86.864132] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 86.871392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 86.878648] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000003 [ 86.885933] CPU: 0 PID: 8562 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 86.892781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.902146] Call Trace: [ 86.904749] dump_stack+0x1b9/0x294 [ 86.908402] ? dump_stack_print_info.cold.2+0x52/0x52 [ 86.913613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.919167] ? __perf_event_task_sched_in+0x247/0xb80 [ 86.924387] should_fail.cold.4+0xa/0x1a [ 86.928472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 86.933608] ? lock_downgrade+0x8e0/0x8e0 [ 86.937770] ? finish_task_switch+0x182/0x820 [ 86.942294] ? kasan_check_read+0x11/0x20 [ 86.946458] ? do_raw_spin_unlock+0x9e/0x2e0 [ 86.950886] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 86.955483] ? compat_start_thread+0x80/0x80 [ 86.959904] ? _raw_spin_unlock_irq+0x27/0x70 [ 86.964416] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 86.969451] ? trace_hardirqs_on+0xd/0x10 [ 86.973618] ? _raw_spin_unlock_irq+0x27/0x70 [ 86.978132] ? finish_task_switch+0x1ca/0x820 [ 86.982649] ? copy_overflow+0x20/0x20 [ 86.986552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 86.992102] ? should_fail+0x21b/0xbcd [ 86.996011] __alloc_pages_nodemask+0x34e/0xd70 [ 87.000704] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 87.005743] ? __sched_text_start+0x8/0x8 [ 87.009900] ? find_held_lock+0x36/0x1c0 [ 87.014018] ? check_same_owner+0x320/0x320 2018/04/12 00:58:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file-\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file#\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:17 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 87.018370] cache_grow_begin+0x72/0x6c0 [ 87.022461] kmem_cache_alloc+0x689/0x760 [ 87.026634] ? retint_kernel+0x10/0x10 [ 87.030544] getname_flags+0xd0/0x5a0 [ 87.034373] user_path_at_empty+0x2d/0x50 [ 87.038537] do_mount+0x172/0x3070 [ 87.042099] ? copy_mount_string+0x40/0x40 [ 87.046350] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.051130] ? retint_kernel+0x10/0x10 [ 87.055047] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 87.060600] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.066147] ? copy_mount_options+0x285/0x380 2018/04/12 00:58:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file+\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 87.070668] ksys_mount+0x12d/0x140 [ 87.074315] SyS_mount+0x35/0x50 [ 87.077689] ? ksys_mount+0x140/0x140 [ 87.081552] do_syscall_64+0x29e/0x9d0 [ 87.085463] ? vmalloc_sync_all+0x30/0x30 [ 87.089635] ? _raw_spin_unlock_irq+0x27/0x70 [ 87.094146] ? finish_task_switch+0x1ca/0x820 [ 87.098666] ? syscall_return_slowpath+0x5c0/0x5c0 [ 87.104153] ? syscall_return_slowpath+0x30f/0x5c0 [ 87.109107] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 87.114502] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/12 00:58:17 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file-\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 87.119369] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 87.124574] RIP: 0033:0x455279 [ 87.127775] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 87.135506] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 87.142780] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 87.150054] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 87.157334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 87.164610] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 [ 87.246422] FAULT_INJECTION: forcing a failure. [ 87.246422] name failslab, interval 1, probability 0, space 0, times 0 [ 87.257937] CPU: 0 PID: 8586 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 87.264802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.274166] Call Trace: [ 87.276775] dump_stack+0x1b9/0x294 [ 87.280423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 87.285628] ? __save_stack_trace+0x7e/0xd0 [ 87.289952] should_fail.cold.4+0xa/0x1a [ 87.294013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 87.299112] ? save_stack+0x43/0xd0 [ 87.302729] ? kasan_kmalloc+0xc4/0xe0 [ 87.306604] ? kmem_cache_alloc_trace+0x152/0x780 [ 87.311435] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 87.316616] ? __list_lru_init+0x456/0x790 [ 87.320838] ? sget_userns+0x6d9/0xf20 [ 87.324719] ? graph_lock+0x170/0x170 [ 87.328507] ? do_mount+0x564/0x3070 [ 87.332211] ? ksys_mount+0x12d/0x140 [ 87.335999] ? SyS_mount+0x35/0x50 [ 87.339539] ? do_syscall_64+0x29e/0x9d0 [ 87.343597] ? find_held_lock+0x36/0x1c0 [ 87.347657] ? __lock_is_held+0xb5/0x140 [ 87.351727] ? check_same_owner+0x320/0x320 [ 87.356045] ? rcu_note_context_switch+0x710/0x710 [ 87.360974] __should_failslab+0x124/0x180 [ 87.365202] should_failslab+0x9/0x14 [ 87.368992] kmem_cache_alloc_trace+0x2cb/0x780 [ 87.373657] ? __kmalloc_node+0x33/0x70 [ 87.377624] ? __kmalloc_node+0x33/0x70 [ 87.381587] ? rcu_read_lock_sched_held+0x108/0x120 [ 87.386604] __memcg_init_list_lru_node+0x17d/0x2c0 [ 87.391615] ? kvfree_rcu+0x20/0x20 [ 87.395234] ? __kmalloc_node+0x47/0x70 [ 87.399208] __list_lru_init+0x456/0x790 [ 87.403268] ? list_lru_destroy+0x4c0/0x4c0 [ 87.407581] ? mark_held_locks+0xc9/0x160 [ 87.411721] ? __raw_spin_lock_init+0x1c/0x100 [ 87.416294] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 87.421301] ? __lockdep_init_map+0x105/0x590 [ 87.425789] ? lockdep_init_map+0x9/0x10 [ 87.429843] sget_userns+0x6d9/0xf20 [ 87.433544] ? set_anon_super+0x20/0x20 [ 87.437512] ? get_empty_filp.cold.7+0x3e/0x3e [ 87.442092] ? destroy_unused_super.part.9+0x100/0x100 [ 87.447364] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 87.452377] ? kasan_check_read+0x11/0x20 [ 87.456519] ? rcu_pm_notify+0xc0/0xc0 [ 87.460391] ? trace_hardirqs_off+0xd/0x10 [ 87.464623] ? cap_capable+0x1f9/0x260 [ 87.468507] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.474036] ? security_capable+0x99/0xc0 [ 87.478178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.483704] ? ns_capable_common+0x13f/0x170 [ 87.488105] mount_ns+0x8f/0x1d0 [ 87.491468] ? rpc_pipe_release+0xb70/0xb70 [ 87.495782] rpc_mount+0x9e/0xd0 [ 87.499141] mount_fs+0xae/0x328 [ 87.502507] vfs_kern_mount.part.34+0xd4/0x4d0 [ 87.507084] ? may_umount+0xb0/0xb0 [ 87.510702] ? _raw_read_unlock+0x22/0x30 [ 87.514847] ? __get_fs_type+0x97/0xc0 [ 87.518732] do_mount+0x564/0x3070 [ 87.522271] ? copy_mount_string+0x40/0x40 [ 87.526500] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.531255] ? retint_kernel+0x10/0x10 [ 87.535144] ? copy_mount_options+0x1e3/0x380 [ 87.539629] ? copy_mount_options+0x1f0/0x380 [ 87.544117] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 87.548951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.554478] ? copy_mount_options+0x285/0x380 [ 87.558970] ksys_mount+0x12d/0x140 [ 87.562592] SyS_mount+0x35/0x50 [ 87.565949] ? ksys_mount+0x140/0x140 [ 87.569742] do_syscall_64+0x29e/0x9d0 [ 87.573617] ? vmalloc_sync_all+0x30/0x30 [ 87.577753] ? kasan_check_write+0x14/0x20 [ 87.581983] ? syscall_return_slowpath+0x5c0/0x5c0 [ 87.586904] ? syscall_return_slowpath+0x30f/0x5c0 [ 87.591827] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 87.597187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 87.602035] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 87.607214] RIP: 0033:0x455279 [ 87.610394] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 87.618100] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 87.625359] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 87.632617] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 87.640135] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 87.647392] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000c 2018/04/12 00:58:18 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x0, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:18 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:18 executing program 3 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:18 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:18 executing program 1 (fault-call:5 fault-nth:13): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:18 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:18 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:18 executing program 0 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 87.781126] FAULT_INJECTION: forcing a failure. [ 87.781126] name failslab, interval 1, probability 0, space 0, times 0 [ 87.783331] FAULT_INJECTION: forcing a failure. [ 87.783331] name failslab, interval 1, probability 0, space 0, times 0 [ 87.792479] CPU: 1 PID: 8599 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 87.810475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.819829] Call Trace: [ 87.822424] dump_stack+0x1b9/0x294 [ 87.826061] ? dump_stack_print_info.cold.2+0x52/0x52 [ 87.831254] ? perf_tp_event+0xc30/0xc30 [ 87.835334] should_fail.cold.4+0xa/0x1a [ 87.839405] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 87.844515] ? perf_trace_lock_acquire+0x4f1/0x980 [ 87.849468] ? find_held_lock+0x36/0x1c0 [ 87.853570] ? check_same_owner+0x320/0x320 [ 87.857897] ? rcu_note_context_switch+0x710/0x710 [ 87.862845] __should_failslab+0x124/0x180 [ 87.867083] should_failslab+0x9/0x14 [ 87.870883] __kmalloc_track_caller+0x2c4/0x760 [ 87.875555] ? kasan_check_read+0x11/0x20 [ 87.879703] ? do_raw_spin_unlock+0x9e/0x2e0 [ 87.884117] ? kstrdup_const+0x66/0x80 [ 87.888014] kstrdup+0x39/0x70 [ 87.891219] kstrdup_const+0x66/0x80 [ 87.894940] alloc_vfsmnt+0x1b3/0x9d0 [ 87.898742] ? mnt_free_id.isra.27+0x60/0x60 [ 87.903154] ? kasan_check_read+0x11/0x20 [ 87.907304] ? graph_lock+0x170/0x170 [ 87.911103] ? rcu_pm_notify+0xc0/0xc0 [ 87.914991] ? trace_hardirqs_off+0xd/0x10 [ 87.919232] ? putname+0xf2/0x130 [ 87.922689] ? putname+0xf2/0x130 [ 87.926146] ? find_held_lock+0x36/0x1c0 [ 87.930227] ? lock_downgrade+0x8e0/0x8e0 [ 87.934376] ? module_unload_free+0x5b0/0x5b0 [ 87.938871] ? lock_release+0xa10/0xa10 [ 87.942853] ? mpi_free.cold.1+0x19/0x19 [ 87.946918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 87.952461] vfs_kern_mount.part.34+0x88/0x4d0 [ 87.957051] ? may_umount+0xb0/0xb0 [ 87.960681] ? _raw_read_unlock+0x22/0x30 [ 87.964829] ? __get_fs_type+0x97/0xc0 [ 87.968727] do_mount+0x564/0x3070 [ 87.972277] ? copy_mount_string+0x40/0x40 [ 87.976516] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 87.981283] ? retint_kernel+0x10/0x10 [ 87.985185] ? copy_mount_options+0x1a1/0x380 [ 87.989679] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 87.994526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.000061] ? copy_mount_options+0x285/0x380 [ 88.004562] ksys_mount+0x12d/0x140 [ 88.008193] SyS_mount+0x35/0x50 [ 88.011556] ? ksys_mount+0x140/0x140 [ 88.015364] do_syscall_64+0x29e/0x9d0 [ 88.019260] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 88.024103] ? syscall_return_slowpath+0x5c0/0x5c0 [ 88.029041] ? syscall_return_slowpath+0x30f/0x5c0 [ 88.033981] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 88.039356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.044211] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 88.049399] RIP: 0033:0x455279 [ 88.052587] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 88.060299] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 88.067564] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 88.074830] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 88.082094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 88.089362] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000006 [ 88.096663] CPU: 0 PID: 8600 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 88.103514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.112876] Call Trace: [ 88.115482] dump_stack+0x1b9/0x294 [ 88.119133] ? dump_stack_print_info.cold.2+0x52/0x52 [ 88.124340] ? find_held_lock+0x36/0x1c0 [ 88.127713] FAULT_INJECTION: forcing a failure. [ 88.127713] name failslab, interval 1, probability 0, space 0, times 0 [ 88.128432] should_fail.cold.4+0xa/0x1a [ 88.128461] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 88.128495] ? kasan_check_read+0x11/0x20 [ 88.152939] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 88.158142] ? find_held_lock+0x36/0x1c0 [ 88.162245] ? check_same_owner+0x320/0x320 [ 88.166575] ? rcu_note_context_switch+0x710/0x710 [ 88.171506] ? save_stack+0xa9/0xd0 [ 88.175141] __should_failslab+0x124/0x180 [ 88.179381] should_failslab+0x9/0x14 [ 88.183187] kmem_cache_alloc+0x2af/0x760 [ 88.187336] ? find_held_lock+0x36/0x1c0 [ 88.191419] getname_flags+0xd0/0x5a0 [ 88.195234] user_path_at_empty+0x2d/0x50 [ 88.199391] do_mount+0x172/0x3070 [ 88.202939] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.207362] ? copy_mount_string+0x40/0x40 [ 88.211597] ? rcu_pm_notify+0xc0/0xc0 [ 88.215499] ? copy_mount_options+0x5f/0x380 [ 88.219910] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.224926] ? kmem_cache_alloc_trace+0x616/0x780 [ 88.229776] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 88.235324] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.240860] ? copy_mount_options+0x285/0x380 [ 88.245363] ksys_mount+0x12d/0x140 [ 88.249002] SyS_mount+0x35/0x50 [ 88.252369] ? ksys_mount+0x140/0x140 [ 88.256180] do_syscall_64+0x29e/0x9d0 [ 88.260073] ? vmalloc_sync_all+0x30/0x30 [ 88.264224] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.268722] ? finish_task_switch+0x1ca/0x820 [ 88.273228] ? syscall_return_slowpath+0x5c0/0x5c0 [ 88.278163] ? syscall_return_slowpath+0x30f/0x5c0 [ 88.283099] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 88.288472] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.293330] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 88.298521] RIP: 0033:0x455279 [ 88.301708] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 88.309422] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 88.316691] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 88.323959] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 88.331229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 88.338495] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000004 [ 88.345796] CPU: 1 PID: 8611 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 88.352635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.361987] Call Trace: [ 88.364584] dump_stack+0x1b9/0x294 [ 88.368218] ? dump_stack_print_info.cold.2+0x52/0x52 [ 88.373414] ? perf_trace_lock_acquire+0xe3/0x980 [ 88.378265] ? __save_stack_trace+0x7e/0xd0 2018/04/12 00:58:19 executing program 3 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 88.382604] should_fail.cold.4+0xa/0x1a [ 88.386676] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 88.391782] ? save_stack+0x43/0xd0 [ 88.395410] ? kasan_kmalloc+0xc4/0xe0 [ 88.399298] ? kmem_cache_alloc_trace+0x152/0x780 [ 88.404150] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 88.409345] ? __list_lru_init+0x456/0x790 [ 88.413580] ? sget_userns+0x6d9/0xf20 [ 88.417483] ? graph_lock+0x170/0x170 [ 88.421284] ? do_mount+0x564/0x3070 [ 88.424986] ? ksys_mount+0x12d/0x140 [ 88.428775] ? SyS_mount+0x35/0x50 [ 88.432303] ? do_syscall_64+0x29e/0x9d0 [ 88.436356] ? find_held_lock+0x36/0x1c0 [ 88.440409] ? __lock_is_held+0xb5/0x140 [ 88.444468] ? check_same_owner+0x320/0x320 [ 88.448783] ? rcu_note_context_switch+0x710/0x710 [ 88.453705] __should_failslab+0x124/0x180 [ 88.457925] should_failslab+0x9/0x14 [ 88.461718] kmem_cache_alloc_trace+0x2cb/0x780 [ 88.466370] ? __kmalloc_node+0x33/0x70 [ 88.470330] ? __kmalloc_node+0x33/0x70 [ 88.474287] ? rcu_read_lock_sched_held+0x108/0x120 [ 88.479292] __memcg_init_list_lru_node+0x17d/0x2c0 [ 88.484294] ? kvfree_rcu+0x20/0x20 [ 88.487908] ? __kmalloc_node+0x47/0x70 [ 88.491874] __list_lru_init+0x456/0x790 [ 88.495922] ? list_lru_destroy+0x4c0/0x4c0 [ 88.500228] ? mark_held_locks+0xc9/0x160 [ 88.504367] ? __raw_spin_lock_init+0x1c/0x100 [ 88.508937] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 88.513938] ? __lockdep_init_map+0x105/0x590 [ 88.518419] ? lockdep_init_map+0x9/0x10 [ 88.522465] sget_userns+0x6d9/0xf20 [ 88.526165] ? set_anon_super+0x20/0x20 [ 88.530124] ? get_empty_filp.cold.7+0x3e/0x3e [ 88.534694] ? destroy_unused_super.part.9+0x100/0x100 [ 88.539957] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 88.544973] ? kasan_check_read+0x11/0x20 [ 88.549106] ? rcu_pm_notify+0xc0/0xc0 [ 88.552975] ? trace_hardirqs_off+0xd/0x10 [ 88.557197] ? cap_capable+0x1f9/0x260 [ 88.561073] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.566594] ? security_capable+0x99/0xc0 [ 88.570731] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.576255] ? ns_capable_common+0x13f/0x170 [ 88.580649] mount_ns+0x8f/0x1d0 [ 88.584006] ? rpc_pipe_release+0xb70/0xb70 [ 88.588320] rpc_mount+0x9e/0xd0 [ 88.591671] mount_fs+0xae/0x328 [ 88.595039] vfs_kern_mount.part.34+0xd4/0x4d0 [ 88.599613] ? may_umount+0xb0/0xb0 [ 88.603226] ? _raw_read_unlock+0x22/0x30 [ 88.607357] ? __get_fs_type+0x97/0xc0 [ 88.611232] do_mount+0x564/0x3070 [ 88.615192] ? copy_mount_string+0x40/0x40 [ 88.619412] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 88.624154] ? retint_kernel+0x10/0x10 [ 88.628038] ? copy_mount_options+0x1a1/0x380 [ 88.632522] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 88.637351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 88.642871] ? copy_mount_options+0x285/0x380 [ 88.647352] ksys_mount+0x12d/0x140 [ 88.650963] SyS_mount+0x35/0x50 [ 88.654314] ? ksys_mount+0x140/0x140 [ 88.658100] do_syscall_64+0x29e/0x9d0 [ 88.661974] ? vmalloc_sync_all+0x30/0x30 [ 88.666104] ? _raw_spin_unlock_irq+0x27/0x70 [ 88.670587] ? finish_task_switch+0x1ca/0x820 [ 88.675067] ? syscall_return_slowpath+0x5c0/0x5c0 [ 88.679993] ? syscall_return_slowpath+0x30f/0x5c0 [ 88.684914] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 88.690266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 88.695097] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 88.700269] RIP: 0033:0x455279 [ 88.703440] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 88.711132] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 88.718383] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 88.725636] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/12 00:58:19 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0c', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 88.732887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 88.740141] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000d 2018/04/12 00:58:19 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:19 executing program 0 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:19 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653092", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:19 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 88.831799] FAULT_INJECTION: forcing a failure. [ 88.831799] name failslab, interval 1, probability 0, space 0, times 0 [ 88.843156] CPU: 1 PID: 8620 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 88.850010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.859377] Call Trace: [ 88.861989] dump_stack+0x1b9/0x294 [ 88.865644] ? dump_stack_print_info.cold.2+0x52/0x52 [ 88.870860] ? perf_tp_event+0xc30/0xc30 [ 88.874953] should_fail.cold.4+0xa/0x1a [ 88.879042] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 88.884170] ? perf_trace_lock_acquire+0x4f1/0x980 [ 88.885080] FAULT_INJECTION: forcing a failure. [ 88.885080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 88.889135] ? find_held_lock+0x36/0x1c0 [ 88.904995] ? check_same_owner+0x320/0x320 [ 88.909323] ? rcu_note_context_switch+0x710/0x710 [ 88.914266] __should_failslab+0x124/0x180 [ 88.918504] should_failslab+0x9/0x14 [ 88.922307] __kmalloc_track_caller+0x2c4/0x760 [ 88.926975] ? kasan_check_read+0x11/0x20 [ 88.931122] ? do_raw_spin_unlock+0x9e/0x2e0 [ 88.935532] ? kstrdup_const+0x66/0x80 [ 88.939422] kstrdup+0x39/0x70 [ 88.942616] kstrdup_const+0x66/0x80 [ 88.946334] alloc_vfsmnt+0x1b3/0x9d0 [ 88.950137] ? mnt_free_id.isra.27+0x60/0x60 [ 88.954545] ? kasan_check_read+0x11/0x20 [ 88.958689] ? graph_lock+0x170/0x170 [ 88.962487] ? rcu_pm_notify+0xc0/0xc0 [ 88.966368] ? trace_hardirqs_off+0xd/0x10 [ 88.970603] ? putname+0xf2/0x130 [ 88.974056] ? putname+0xf2/0x130 [ 88.977515] ? find_held_lock+0x36/0x1c0 [ 88.981589] ? lock_downgrade+0x8e0/0x8e0 [ 88.985739] ? module_unload_free+0x5b0/0x5b0 [ 88.990235] ? lock_release+0xa10/0xa10 [ 88.994215] ? mpi_free.cold.1+0x19/0x19 [ 88.998278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.003823] vfs_kern_mount.part.34+0x88/0x4d0 [ 89.008412] ? may_umount+0xb0/0xb0 [ 89.012037] ? _raw_read_unlock+0x22/0x30 [ 89.016184] ? __get_fs_type+0x97/0xc0 [ 89.020081] do_mount+0x564/0x3070 [ 89.023620] ? do_raw_spin_unlock+0x9e/0x2e0 [ 89.028033] ? copy_mount_string+0x40/0x40 [ 89.032267] ? rcu_pm_notify+0xc0/0xc0 [ 89.036169] ? copy_mount_options+0x5f/0x380 [ 89.040572] ? rcu_read_lock_sched_held+0x108/0x120 [ 89.045585] ? kmem_cache_alloc_trace+0x616/0x780 [ 89.050429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 89.055974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.061511] ? copy_mount_options+0x285/0x380 [ 89.066014] ksys_mount+0x12d/0x140 [ 89.069642] SyS_mount+0x35/0x50 [ 89.073006] ? ksys_mount+0x140/0x140 [ 89.076815] do_syscall_64+0x29e/0x9d0 [ 89.080700] ? vmalloc_sync_all+0x30/0x30 [ 89.084845] ? _raw_spin_unlock_irq+0x27/0x70 [ 89.089340] ? finish_task_switch+0x1ca/0x820 [ 89.093841] ? syscall_return_slowpath+0x5c0/0x5c0 [ 89.098771] ? syscall_return_slowpath+0x30f/0x5c0 [ 89.103704] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 89.109076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.113929] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 89.119115] RIP: 0033:0x455279 [ 89.122299] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 89.130010] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 89.137277] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 89.144542] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 89.151808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 89.159072] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000007 [ 89.166373] CPU: 0 PID: 8625 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 89.173223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.182587] Call Trace: [ 89.185194] dump_stack+0x1b9/0x294 [ 89.188849] ? dump_stack_print_info.cold.2+0x52/0x52 [ 89.194061] ? debug_check_no_locks_freed+0x310/0x310 [ 89.199295] should_fail.cold.4+0xa/0x1a [ 89.203389] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 89.208521] ? debug_check_no_locks_freed+0x310/0x310 [ 89.213736] ? perf_tp_event+0xc30/0xc30 [ 89.217812] ? graph_lock+0x170/0x170 [ 89.221630] ? print_usage_bug+0xc0/0xc0 [ 89.225712] ? memset+0x31/0x40 2018/04/12 00:58:20 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 89.229014] ? perf_trace_lock_acquire+0x4f1/0x980 [ 89.233963] ? find_held_lock+0x36/0x1c0 [ 89.238051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.243604] ? should_fail+0x21b/0xbcd [ 89.247524] __alloc_pages_nodemask+0x34e/0xd70 [ 89.252209] ? kasan_check_read+0x11/0x20 [ 89.256463] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 89.261504] ? find_held_lock+0x36/0x1c0 [ 89.265619] ? check_same_owner+0x320/0x320 [ 89.269964] cache_grow_begin+0x72/0x6c0 [ 89.274059] kmem_cache_alloc+0x689/0x760 [ 89.278227] ? find_held_lock+0x36/0x1c0 [ 89.282321] getname_flags+0xd0/0x5a0 [ 89.286145] user_path_at_empty+0x2d/0x50 [ 89.290316] do_mount+0x172/0x3070 [ 89.293871] ? do_raw_spin_unlock+0x9e/0x2e0 [ 89.298297] ? retint_kernel+0x10/0x10 [ 89.302204] ? copy_mount_string+0x40/0x40 [ 89.306450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 89.311230] ? retint_kernel+0x10/0x10 [ 89.315149] ? copy_mount_options+0x213/0x380 [ 89.319662] ? write_comp_data+0x22/0x70 [ 89.323744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.329296] ? copy_mount_options+0x285/0x380 2018/04/12 00:58:20 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:20 executing program 3 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 89.333810] ksys_mount+0x12d/0x140 [ 89.337452] SyS_mount+0x35/0x50 [ 89.340827] ? ksys_mount+0x140/0x140 [ 89.344648] do_syscall_64+0x29e/0x9d0 [ 89.348551] ? vmalloc_sync_all+0x30/0x30 [ 89.352716] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 89.357577] ? syscall_return_slowpath+0x5c0/0x5c0 [ 89.362527] ? syscall_return_slowpath+0x30f/0x5c0 [ 89.367484] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 89.372874] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.377745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/12 00:58:20 executing program 1 (fault-call:5 fault-nth:14): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 89.382947] RIP: 0033:0x455279 [ 89.386145] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 89.393876] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 89.401157] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 89.408440] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 89.415715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 89.422983] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000005 [ 89.493546] FAULT_INJECTION: forcing a failure. [ 89.493546] name failslab, interval 1, probability 0, space 0, times 0 [ 89.504847] CPU: 1 PID: 8650 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 89.512138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.521496] Call Trace: [ 89.524101] dump_stack+0x1b9/0x294 [ 89.527746] ? dump_stack_print_info.cold.2+0x52/0x52 [ 89.532536] FAULT_INJECTION: forcing a failure. [ 89.532536] name failslab, interval 1, probability 0, space 0, times 0 [ 89.532941] ? perf_trace_lock_acquire+0xe3/0x980 [ 89.532966] ? __save_stack_trace+0x7e/0xd0 [ 89.553289] should_fail.cold.4+0xa/0x1a [ 89.557351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 89.562468] ? save_stack+0x43/0xd0 [ 89.566088] ? kasan_kmalloc+0xc4/0xe0 [ 89.569970] ? kmem_cache_alloc_trace+0x152/0x780 [ 89.574810] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 89.579994] ? __list_lru_init+0x456/0x790 [ 89.584220] ? sget_userns+0x6d9/0xf20 [ 89.588101] ? graph_lock+0x170/0x170 [ 89.591891] ? do_mount+0x564/0x3070 [ 89.595592] ? ksys_mount+0x12d/0x140 [ 89.599380] ? SyS_mount+0x35/0x50 [ 89.602915] ? do_syscall_64+0x29e/0x9d0 [ 89.606970] ? find_held_lock+0x36/0x1c0 [ 89.611031] ? __lock_is_held+0xb5/0x140 [ 89.615099] ? check_same_owner+0x320/0x320 [ 89.619422] ? rcu_note_context_switch+0x710/0x710 [ 89.624348] __should_failslab+0x124/0x180 [ 89.628577] should_failslab+0x9/0x14 [ 89.632369] kmem_cache_alloc_trace+0x2cb/0x780 [ 89.637030] ? __kmalloc_node+0x33/0x70 [ 89.640996] ? __kmalloc_node+0x33/0x70 [ 89.644965] ? rcu_read_lock_sched_held+0x108/0x120 [ 89.649992] __memcg_init_list_lru_node+0x17d/0x2c0 [ 89.655006] ? kvfree_rcu+0x20/0x20 [ 89.658627] ? __kmalloc_node+0x47/0x70 [ 89.662604] __list_lru_init+0x456/0x790 [ 89.666663] ? list_lru_destroy+0x4c0/0x4c0 [ 89.670975] ? mark_held_locks+0xc9/0x160 [ 89.675119] ? __raw_spin_lock_init+0x1c/0x100 [ 89.679693] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 89.684703] ? __lockdep_init_map+0x105/0x590 [ 89.689194] ? lockdep_init_map+0x9/0x10 [ 89.693249] sget_userns+0x6d9/0xf20 [ 89.696951] ? set_anon_super+0x20/0x20 [ 89.700926] ? get_empty_filp.cold.7+0x3e/0x3e [ 89.705503] ? destroy_unused_super.part.9+0x100/0x100 [ 89.710779] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 89.715789] ? kasan_check_read+0x11/0x20 [ 89.719928] ? rcu_pm_notify+0xc0/0xc0 [ 89.723806] ? trace_hardirqs_off+0xd/0x10 [ 89.728038] ? cap_capable+0x1f9/0x260 [ 89.731925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.737452] ? security_capable+0x99/0xc0 [ 89.741597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.747126] ? ns_capable_common+0x13f/0x170 [ 89.751529] mount_ns+0x8f/0x1d0 [ 89.754888] ? rpc_pipe_release+0xb70/0xb70 [ 89.759207] rpc_mount+0x9e/0xd0 [ 89.762569] mount_fs+0xae/0x328 [ 89.765937] vfs_kern_mount.part.34+0xd4/0x4d0 [ 89.770513] ? may_umount+0xb0/0xb0 [ 89.774131] ? _raw_read_unlock+0x22/0x30 [ 89.778272] ? __get_fs_type+0x97/0xc0 [ 89.782158] do_mount+0x564/0x3070 [ 89.785690] ? do_raw_spin_unlock+0x9e/0x2e0 [ 89.790098] ? copy_mount_string+0x40/0x40 [ 89.794322] ? rcu_pm_notify+0xc0/0xc0 [ 89.798207] ? copy_mount_options+0x5f/0x380 [ 89.802609] ? rcu_read_lock_sched_held+0x108/0x120 [ 89.807618] ? kmem_cache_alloc_trace+0x616/0x780 [ 89.812457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 89.817993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 89.823523] ? copy_mount_options+0x285/0x380 [ 89.828014] ksys_mount+0x12d/0x140 [ 89.831639] SyS_mount+0x35/0x50 [ 89.834994] ? ksys_mount+0x140/0x140 [ 89.838789] do_syscall_64+0x29e/0x9d0 [ 89.842672] ? vmalloc_sync_all+0x30/0x30 [ 89.846812] ? kasan_check_write+0x14/0x20 [ 89.851045] ? syscall_return_slowpath+0x5c0/0x5c0 [ 89.855969] ? syscall_return_slowpath+0x30f/0x5c0 [ 89.860897] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 89.866255] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 89.871096] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 89.876274] RIP: 0033:0x455279 [ 89.879455] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 89.887156] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 89.894414] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 89.901675] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 89.908936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 89.916197] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000e [ 89.923481] CPU: 0 PID: 8647 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 89.930335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.939693] Call Trace: [ 89.942297] dump_stack+0x1b9/0x294 [ 89.945951] ? dump_stack_print_info.cold.2+0x52/0x52 [ 89.951181] should_fail.cold.4+0xa/0x1a [ 89.955272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 89.960412] ? kasan_check_read+0x11/0x20 [ 89.964578] ? rcu_is_watching+0x85/0x140 [ 89.968745] ? find_held_lock+0x36/0x1c0 [ 89.972866] ? check_same_owner+0x320/0x320 [ 89.977209] ? rcu_note_context_switch+0x710/0x710 [ 89.982167] __should_failslab+0x124/0x180 [ 89.986418] should_failslab+0x9/0x14 [ 89.990239] kmem_cache_alloc_trace+0x2cb/0x780 [ 89.994921] ? graph_lock+0x170/0x170 [ 89.998735] ? rcu_pm_notify+0xc0/0xc0 [ 90.002635] ? trace_hardirqs_off+0xd/0x10 [ 90.006893] nfs_fs_mount+0x186/0x2f3d [ 90.010797] ? putname+0xf2/0x130 [ 90.014282] ? nfs_show_options+0x250/0x250 [ 90.018627] ? nfs_clone_super+0x420/0x420 [ 90.022875] ? nfs_parse_mount_options+0x2640/0x2640 [ 90.027991] ? lock_downgrade+0x8e0/0x8e0 [ 90.032140] ? module_unload_free+0x5b0/0x5b0 [ 90.036627] mount_fs+0xae/0x328 [ 90.039977] ? mpi_free.cold.1+0x19/0x19 [ 90.044044] vfs_kern_mount.part.34+0xd4/0x4d0 [ 90.048619] ? may_umount+0xb0/0xb0 [ 90.052236] ? _raw_read_unlock+0x22/0x30 [ 90.056382] ? __get_fs_type+0x97/0xc0 [ 90.060271] do_mount+0x564/0x3070 [ 90.063796] ? do_raw_spin_unlock+0x9e/0x2e0 [ 90.068194] ? copy_mount_string+0x40/0x40 [ 90.072415] ? rcu_pm_notify+0xc0/0xc0 [ 90.076295] ? copy_mount_options+0x5f/0x380 [ 90.080688] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.085691] ? kmem_cache_alloc_trace+0x616/0x780 [ 90.090539] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 90.096081] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.101603] ? copy_mount_options+0x285/0x380 [ 90.106092] ksys_mount+0x12d/0x140 [ 90.109707] SyS_mount+0x35/0x50 [ 90.113060] ? ksys_mount+0x140/0x140 [ 90.116849] do_syscall_64+0x29e/0x9d0 [ 90.120726] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 90.125554] ? syscall_return_slowpath+0x5c0/0x5c0 [ 90.130479] ? syscall_return_slowpath+0x30f/0x5c0 [ 90.135398] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 90.140754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 90.145594] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 90.150768] RIP: 0033:0x455279 [ 90.153943] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 90.161645] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 90.168900] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 90.176154] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 90.183406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 90.190667] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000008 2018/04/12 00:58:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309b", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:21 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:21 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:21 executing program 0 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:21 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:21 executing program 3 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:21 executing program 1 (fault-call:5 fault-nth:15): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 90.296318] FAULT_INJECTION: forcing a failure. [ 90.296318] name failslab, interval 1, probability 0, space 0, times 0 [ 90.297675] FAULT_INJECTION: forcing a failure. [ 90.297675] name failslab, interval 1, probability 0, space 0, times 0 [ 90.307632] CPU: 0 PID: 8670 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 90.307651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.334997] Call Trace: [ 90.337595] dump_stack+0x1b9/0x294 [ 90.341232] ? dump_stack_print_info.cold.2+0x52/0x52 [ 90.346425] ? __save_stack_trace+0x7e/0xd0 [ 90.350764] should_fail.cold.4+0xa/0x1a [ 90.354834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 90.359943] ? save_stack+0x43/0xd0 [ 90.363571] ? kasan_kmalloc+0xc4/0xe0 [ 90.367456] ? kmem_cache_alloc_trace+0x152/0x780 [ 90.372301] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 90.377491] ? __list_lru_init+0x456/0x790 [ 90.381724] ? sget_userns+0x6d9/0xf20 [ 90.385613] ? graph_lock+0x170/0x170 [ 90.389412] ? do_mount+0x564/0x3070 [ 90.393122] ? ksys_mount+0x12d/0x140 [ 90.396919] ? SyS_mount+0x35/0x50 [ 90.400460] ? do_syscall_64+0x29e/0x9d0 [ 90.404531] ? find_held_lock+0x36/0x1c0 [ 90.408600] ? __lock_is_held+0xb5/0x140 [ 90.412683] ? check_same_owner+0x320/0x320 [ 90.417009] ? rcu_note_context_switch+0x710/0x710 [ 90.421954] __should_failslab+0x124/0x180 [ 90.426191] should_failslab+0x9/0x14 [ 90.429994] kmem_cache_alloc_trace+0x2cb/0x780 [ 90.434661] ? __kmalloc_node+0x33/0x70 [ 90.438632] ? __kmalloc_node+0x33/0x70 [ 90.442610] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.447638] __memcg_init_list_lru_node+0x17d/0x2c0 [ 90.452662] ? kvfree_rcu+0x20/0x20 [ 90.456287] ? __kmalloc_node+0x47/0x70 [ 90.460277] __list_lru_init+0x456/0x790 [ 90.464350] ? list_lru_destroy+0x4c0/0x4c0 [ 90.468669] ? mark_held_locks+0xc9/0x160 [ 90.472821] ? __raw_spin_lock_init+0x1c/0x100 [ 90.477403] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 90.482418] ? __lockdep_init_map+0x105/0x590 [ 90.486917] ? lockdep_init_map+0x9/0x10 [ 90.490983] sget_userns+0x6d9/0xf20 [ 90.494694] ? set_anon_super+0x20/0x20 [ 90.498673] ? get_empty_filp.cold.7+0x3e/0x3e [ 90.503257] ? destroy_unused_super.part.9+0x100/0x100 [ 90.508540] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 90.513563] ? kasan_check_read+0x11/0x20 [ 90.517724] ? rcu_pm_notify+0xc0/0xc0 [ 90.521606] ? trace_hardirqs_off+0xd/0x10 [ 90.525844] ? cap_capable+0x1f9/0x260 [ 90.529741] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.535278] ? security_capable+0x99/0xc0 [ 90.539430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.544969] ? ns_capable_common+0x13f/0x170 [ 90.549383] mount_ns+0x8f/0x1d0 [ 90.552750] ? rpc_pipe_release+0xb70/0xb70 [ 90.557077] rpc_mount+0x9e/0xd0 [ 90.560449] mount_fs+0xae/0x328 [ 90.563828] vfs_kern_mount.part.34+0xd4/0x4d0 [ 90.568415] ? may_umount+0xb0/0xb0 [ 90.572041] ? _raw_read_unlock+0x22/0x30 [ 90.576191] ? __get_fs_type+0x97/0xc0 [ 90.580091] do_mount+0x564/0x3070 [ 90.583629] ? do_raw_spin_unlock+0x9e/0x2e0 [ 90.588048] ? copy_mount_string+0x40/0x40 [ 90.592281] ? rcu_pm_notify+0xc0/0xc0 [ 90.596187] ? copy_mount_options+0x5f/0x380 [ 90.600593] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.605607] ? kmem_cache_alloc_trace+0x616/0x780 [ 90.610454] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 90.616004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.621540] ? copy_mount_options+0x285/0x380 [ 90.626045] ksys_mount+0x12d/0x140 [ 90.629675] SyS_mount+0x35/0x50 [ 90.633044] ? ksys_mount+0x140/0x140 [ 90.636847] do_syscall_64+0x29e/0x9d0 [ 90.640731] ? vmalloc_sync_all+0x30/0x30 [ 90.644875] ? _raw_spin_unlock_irq+0x27/0x70 [ 90.649372] ? finish_task_switch+0x1ca/0x820 [ 90.653869] ? syscall_return_slowpath+0x5c0/0x5c0 [ 90.658800] ? syscall_return_slowpath+0x30f/0x5c0 [ 90.663735] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 90.669109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 90.673961] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 90.679434] RIP: 0033:0x455279 [ 90.682620] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 90.690333] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 90.697599] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 90.704863] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 90.712129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 90.719394] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000000f [ 90.726694] CPU: 1 PID: 8673 Comm: syz-executor0 Not tainted 4.16.0+ #17 [ 90.733537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.742892] Call Trace: [ 90.745495] dump_stack+0x1b9/0x294 [ 90.749130] ? dump_stack_print_info.cold.2+0x52/0x52 [ 90.753082] FAULT_INJECTION: forcing a failure. [ 90.753082] name failslab, interval 1, probability 0, space 0, times 0 [ 90.754318] ? perf_trace_lock_acquire+0xe3/0x980 [ 90.754335] ? kernel_text_address+0x79/0xf0 [ 90.754351] ? __unwind_start+0x166/0x330 [ 90.754367] ? __kernel_text_address+0xd/0x40 [ 90.754391] should_fail.cold.4+0xa/0x1a [ 90.754413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 90.754431] ? perf_trace_lock_acquire+0xe3/0x980 [ 90.754447] ? save_stack+0x43/0xd0 [ 90.754469] ? find_held_lock+0x36/0x1c0 [ 90.805059] ? check_same_owner+0x320/0x320 [ 90.809377] ? rcu_note_context_switch+0x710/0x710 [ 90.814304] __should_failslab+0x124/0x180 [ 90.818534] should_failslab+0x9/0x14 [ 90.822325] __kmalloc_track_caller+0x2c4/0x760 [ 90.826991] ? kasan_check_read+0x11/0x20 [ 90.831134] ? do_raw_spin_unlock+0x9e/0x2e0 [ 90.835535] ? kstrdup_const+0x66/0x80 [ 90.839416] kstrdup+0x39/0x70 [ 90.842601] kstrdup_const+0x66/0x80 [ 90.846320] alloc_vfsmnt+0x1b3/0x9d0 [ 90.850114] ? mnt_free_id.isra.27+0x60/0x60 [ 90.854515] ? kasan_check_read+0x11/0x20 [ 90.858653] ? graph_lock+0x170/0x170 [ 90.862449] ? rcu_pm_notify+0xc0/0xc0 [ 90.866326] ? trace_hardirqs_off+0xd/0x10 [ 90.870555] ? putname+0xf2/0x130 [ 90.874005] ? putname+0xf2/0x130 [ 90.877458] ? find_held_lock+0x36/0x1c0 [ 90.881518] ? lock_downgrade+0x8e0/0x8e0 [ 90.885665] ? module_unload_free+0x5b0/0x5b0 [ 90.890154] ? lock_release+0xa10/0xa10 [ 90.894124] ? mpi_free.cold.1+0x19/0x19 [ 90.898178] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.903710] vfs_kern_mount.part.34+0x88/0x4d0 [ 90.908290] ? may_umount+0xb0/0xb0 [ 90.911912] ? _raw_read_unlock+0x22/0x30 [ 90.916061] ? __get_fs_type+0x97/0xc0 [ 90.919946] do_mount+0x564/0x3070 [ 90.923484] ? copy_mount_string+0x40/0x40 [ 90.927710] ? rcu_pm_notify+0xc0/0xc0 [ 90.931596] ? copy_mount_options+0x5f/0x380 [ 90.935998] ? rcu_read_lock_sched_held+0x108/0x120 [ 90.941009] ? kmem_cache_alloc_trace+0x616/0x780 [ 90.945849] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 90.951378] ? _copy_from_user+0xdf/0x150 [ 90.955524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 90.961055] ? copy_mount_options+0x285/0x380 [ 90.965544] ksys_mount+0x12d/0x140 [ 90.969167] SyS_mount+0x35/0x50 [ 90.972523] ? ksys_mount+0x140/0x140 [ 90.976316] do_syscall_64+0x29e/0x9d0 [ 90.980194] ? vmalloc_sync_all+0x30/0x30 [ 90.984335] ? kasan_check_write+0x14/0x20 [ 90.988565] ? syscall_return_slowpath+0x5c0/0x5c0 [ 90.993490] ? syscall_return_slowpath+0x30f/0x5c0 [ 90.998415] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 91.003777] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 91.008618] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.013797] RIP: 0033:0x455279 [ 91.016976] RSP: 002b:00007f7ceb1b6c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 91.024680] RAX: ffffffffffffffda RBX: 00007f7ceb1b76d4 RCX: 0000000000455279 [ 91.031942] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 91.039200] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 91.046462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 91.053721] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000006 [ 91.061007] CPU: 0 PID: 8676 Comm: syz-executor3 Not tainted 4.16.0+ #17 [ 91.067858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.077222] Call Trace: [ 91.079827] dump_stack+0x1b9/0x294 [ 91.083475] ? dump_stack_print_info.cold.2+0x52/0x52 [ 91.088685] ? unwind_get_return_address+0x61/0xa0 [ 91.093633] ? __save_stack_trace+0x7e/0xd0 2018/04/12 00:58:21 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0z', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:21 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 91.097984] should_fail.cold.4+0xa/0x1a [ 91.102070] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 91.107194] ? save_stack+0xa9/0xd0 [ 91.110841] ? save_stack+0x43/0xd0 [ 91.114480] ? kasan_kmalloc+0xc4/0xe0 [ 91.118376] ? kmem_cache_alloc_trace+0x152/0x780 [ 91.123228] ? mount_fs+0xae/0x328 [ 91.126781] ? vfs_kern_mount.part.34+0xd4/0x4d0 [ 91.131543] ? do_mount+0x564/0x3070 [ 91.135249] ? ksys_mount+0x12d/0x140 [ 91.139041] ? SyS_mount+0x35/0x50 [ 91.142578] ? do_syscall_64+0x29e/0x9d0 [ 91.146634] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.151991] ? kasan_check_read+0x11/0x20 [ 91.156135] ? rcu_is_watching+0x85/0x140 [ 91.160281] ? find_held_lock+0x36/0x1c0 [ 91.164360] ? check_same_owner+0x320/0x320 [ 91.168669] ? kasan_check_read+0x11/0x20 [ 91.172805] ? rcu_is_watching+0x85/0x140 [ 91.176946] ? rcu_note_context_switch+0x710/0x710 [ 91.181862] ? rcu_pm_notify+0xc0/0xc0 [ 91.185746] __should_failslab+0x124/0x180 [ 91.189975] should_failslab+0x9/0x14 [ 91.193763] kmem_cache_alloc_trace+0x2cb/0x780 [ 91.198423] ? kmem_cache_alloc_trace+0x616/0x780 [ 91.203256] ? graph_lock+0x170/0x170 [ 91.207051] ? rcu_pm_notify+0xc0/0xc0 [ 91.210934] nfs_alloc_fhandle+0x3e/0x90 [ 91.214990] nfs_fs_mount+0x53c/0x2f3d [ 91.218882] ? nfs_show_options+0x250/0x250 [ 91.223201] ? nfs_clone_super+0x420/0x420 [ 91.227431] ? nfs_parse_mount_options+0x2640/0x2640 [ 91.232525] ? lock_downgrade+0x8e0/0x8e0 [ 91.236663] ? module_unload_free+0x5b0/0x5b0 [ 91.241148] ? retint_kernel+0x10/0x10 [ 91.245038] mount_fs+0xae/0x328 [ 91.248402] vfs_kern_mount.part.34+0xd4/0x4d0 [ 91.252978] ? may_umount+0xb0/0xb0 [ 91.256592] ? _raw_read_unlock+0x22/0x30 [ 91.260729] ? __get_fs_type+0x97/0xc0 [ 91.264620] do_mount+0x564/0x3070 [ 91.268162] ? copy_mount_string+0x40/0x40 [ 91.272392] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 91.277148] ? retint_kernel+0x10/0x10 [ 91.281051] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 91.286579] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.292102] ? copy_mount_options+0x285/0x380 [ 91.296598] ksys_mount+0x12d/0x140 [ 91.300220] SyS_mount+0x35/0x50 [ 91.303574] ? ksys_mount+0x140/0x140 [ 91.307367] do_syscall_64+0x29e/0x9d0 [ 91.311244] ? vmalloc_sync_all+0x30/0x30 [ 91.315390] ? _raw_spin_unlock_irq+0x27/0x70 [ 91.319877] ? finish_task_switch+0x1ca/0x820 [ 91.324366] ? syscall_return_slowpath+0x5c0/0x5c0 [ 91.329286] ? syscall_return_slowpath+0x30f/0x5c0 [ 91.334212] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 91.339571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 91.344410] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.349589] RIP: 0033:0x455279 [ 91.352766] RSP: 002b:00007f711c522c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 91.360469] RAX: ffffffffffffffda RBX: 00007f711c5236d4 RCX: 0000000000455279 [ 91.367728] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 000000002091dff8 [ 91.374988] RBP: 000000000072bea0 R08: 000000002000a000 R09: 0000000000000000 [ 91.382249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 91.389505] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000009 2018/04/12 00:58:22 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:22 executing program 1 (fault-call:5 fault-nth:16): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:22 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 91.534374] FAULT_INJECTION: forcing a failure. [ 91.534374] name failslab, interval 1, probability 0, space 0, times 0 [ 91.545746] CPU: 1 PID: 8697 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 91.552591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.561951] Call Trace: [ 91.564553] dump_stack+0x1b9/0x294 [ 91.568192] ? dump_stack_print_info.cold.2+0x52/0x52 [ 91.573391] ? perf_trace_lock_acquire+0xe3/0x980 [ 91.578247] ? __save_stack_trace+0x7e/0xd0 [ 91.582588] should_fail.cold.4+0xa/0x1a [ 91.586668] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 91.591780] ? save_stack+0x43/0xd0 [ 91.595415] ? kasan_kmalloc+0xc4/0xe0 [ 91.599308] ? kmem_cache_alloc_trace+0x152/0x780 [ 91.604156] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 91.609358] ? __list_lru_init+0x456/0x790 [ 91.613604] ? sget_userns+0x6d9/0xf20 [ 91.617498] ? graph_lock+0x170/0x170 [ 91.621300] ? do_mount+0x564/0x3070 [ 91.625020] ? ksys_mount+0x12d/0x140 [ 91.628839] ? SyS_mount+0x35/0x50 [ 91.632391] ? do_syscall_64+0x29e/0x9d0 [ 91.636469] ? find_held_lock+0x36/0x1c0 [ 91.640544] ? __lock_is_held+0xb5/0x140 [ 91.644632] ? check_same_owner+0x320/0x320 [ 91.648960] ? rcu_note_context_switch+0x710/0x710 [ 91.653884] __should_failslab+0x124/0x180 [ 91.658106] should_failslab+0x9/0x14 [ 91.661891] kmem_cache_alloc_trace+0x2cb/0x780 [ 91.666542] ? __kmalloc_node+0x33/0x70 [ 91.670499] ? __kmalloc_node+0x33/0x70 [ 91.674460] ? rcu_read_lock_sched_held+0x108/0x120 [ 91.679469] __memcg_init_list_lru_node+0x17d/0x2c0 [ 91.684474] ? kvfree_rcu+0x20/0x20 [ 91.688088] ? __kmalloc_node+0x47/0x70 [ 91.692056] __list_lru_init+0x456/0x790 [ 91.696107] ? list_lru_destroy+0x4c0/0x4c0 [ 91.700414] ? mark_held_locks+0xc9/0x160 [ 91.704549] ? __raw_spin_lock_init+0x1c/0x100 [ 91.709116] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 91.714116] ? __lockdep_init_map+0x105/0x590 [ 91.718600] ? lockdep_init_map+0x9/0x10 [ 91.722648] sget_userns+0x6d9/0xf20 [ 91.726345] ? set_anon_super+0x20/0x20 [ 91.730304] ? get_empty_filp.cold.7+0x3e/0x3e [ 91.734870] ? destroy_unused_super.part.9+0x100/0x100 [ 91.740134] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 91.745138] ? kasan_check_read+0x11/0x20 [ 91.749272] ? rcu_pm_notify+0xc0/0xc0 [ 91.753141] ? trace_hardirqs_off+0xd/0x10 [ 91.757364] ? cap_capable+0x1f9/0x260 [ 91.761242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.766761] ? security_capable+0x99/0xc0 [ 91.770895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.776419] ? ns_capable_common+0x13f/0x170 [ 91.780812] mount_ns+0x8f/0x1d0 [ 91.784164] ? rpc_pipe_release+0xb70/0xb70 [ 91.788472] rpc_mount+0x9e/0xd0 [ 91.791822] mount_fs+0xae/0x328 [ 91.795178] vfs_kern_mount.part.34+0xd4/0x4d0 [ 91.799745] ? may_umount+0xb0/0xb0 [ 91.803356] ? _raw_read_unlock+0x22/0x30 [ 91.807490] ? __get_fs_type+0x97/0xc0 [ 91.811364] do_mount+0x564/0x3070 [ 91.814901] ? copy_mount_string+0x40/0x40 [ 91.819122] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 91.823869] ? retint_kernel+0x10/0x10 [ 91.827751] ? copy_mount_options+0x1e3/0x380 [ 91.832233] ? write_comp_data+0x70/0x70 [ 91.836280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 91.841799] ? copy_mount_options+0x285/0x380 [ 91.846279] ksys_mount+0x12d/0x140 [ 91.849891] SyS_mount+0x35/0x50 [ 91.853243] ? ksys_mount+0x140/0x140 [ 91.857041] do_syscall_64+0x29e/0x9d0 [ 91.860917] ? vmalloc_sync_all+0x30/0x30 [ 91.865047] ? _raw_spin_unlock_irq+0x27/0x70 [ 91.869531] ? finish_task_switch+0x1ca/0x820 [ 91.874014] ? syscall_return_slowpath+0x5c0/0x5c0 [ 91.878934] ? syscall_return_slowpath+0x30f/0x5c0 [ 91.883852] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 91.889205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 91.894046] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 91.899217] RIP: 0033:0x455279 [ 91.902397] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 91.910093] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 91.917348] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 91.924648] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 91.931900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 91.939151] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000010 2018/04/12 00:58:22 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:22 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:22 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='//file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:22 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653097", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='//file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:22 executing program 1 (fault-call:5 fault-nth:17): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:22 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 92.153848] FAULT_INJECTION: forcing a failure. [ 92.153848] name failslab, interval 1, probability 0, space 0, times 0 [ 92.165339] CPU: 1 PID: 8719 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 92.172188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.181542] Call Trace: [ 92.184150] dump_stack+0x1b9/0x294 [ 92.187789] ? dump_stack_print_info.cold.2+0x52/0x52 [ 92.193036] ? perf_trace_lock_acquire+0xe3/0x980 [ 92.197896] ? __save_stack_trace+0x7e/0xd0 [ 92.202240] should_fail.cold.4+0xa/0x1a [ 92.206323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 92.211437] ? save_stack+0x43/0xd0 [ 92.215075] ? kasan_kmalloc+0xc4/0xe0 [ 92.218974] ? kmem_cache_alloc_trace+0x152/0x780 [ 92.223827] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 92.229028] ? __list_lru_init+0x456/0x790 [ 92.233266] ? sget_userns+0x6d9/0xf20 [ 92.237160] ? graph_lock+0x170/0x170 [ 92.240960] ? do_mount+0x564/0x3070 [ 92.244660] ? ksys_mount+0x12d/0x140 [ 92.248447] ? SyS_mount+0x35/0x50 [ 92.251977] ? do_syscall_64+0x29e/0x9d0 [ 92.256040] ? find_held_lock+0x36/0x1c0 [ 92.260093] ? __lock_is_held+0xb5/0x140 [ 92.264148] ? check_same_owner+0x320/0x320 [ 92.268457] ? rcu_note_context_switch+0x710/0x710 [ 92.273378] __should_failslab+0x124/0x180 [ 92.277601] should_failslab+0x9/0x14 [ 92.281385] kmem_cache_alloc_trace+0x2cb/0x780 [ 92.286045] ? __kmalloc_node+0x33/0x70 [ 92.290006] ? __kmalloc_node+0x33/0x70 [ 92.293976] ? rcu_read_lock_sched_held+0x108/0x120 [ 92.298982] __memcg_init_list_lru_node+0x17d/0x2c0 [ 92.303986] ? kvfree_rcu+0x20/0x20 [ 92.307601] ? __kmalloc_node+0x47/0x70 [ 92.311569] __list_lru_init+0x456/0x790 [ 92.315620] ? list_lru_destroy+0x4c0/0x4c0 [ 92.319929] ? mark_held_locks+0xc9/0x160 [ 92.324064] ? __raw_spin_lock_init+0x1c/0x100 [ 92.328632] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 92.333634] ? __lockdep_init_map+0x105/0x590 [ 92.338636] ? lockdep_init_map+0x9/0x10 [ 92.342683] sget_userns+0x6d9/0xf20 [ 92.346382] ? set_anon_super+0x20/0x20 [ 92.350341] ? get_empty_filp.cold.7+0x3e/0x3e [ 92.354909] ? destroy_unused_super.part.9+0x100/0x100 [ 92.360175] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 92.365181] ? kasan_check_read+0x11/0x20 [ 92.369314] ? rcu_pm_notify+0xc0/0xc0 [ 92.373182] ? trace_hardirqs_off+0xd/0x10 [ 92.377406] ? cap_capable+0x1f9/0x260 [ 92.381280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 92.386799] ? security_capable+0x99/0xc0 [ 92.390933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 92.396456] ? ns_capable_common+0x13f/0x170 [ 92.400854] mount_ns+0x8f/0x1d0 [ 92.404210] ? rpc_pipe_release+0xb70/0xb70 [ 92.408519] rpc_mount+0x9e/0xd0 [ 92.411880] mount_fs+0xae/0x328 [ 92.415238] vfs_kern_mount.part.34+0xd4/0x4d0 [ 92.419811] ? may_umount+0xb0/0xb0 [ 92.423423] ? _raw_read_unlock+0x22/0x30 [ 92.427557] ? __get_fs_type+0x97/0xc0 [ 92.431430] do_mount+0x564/0x3070 [ 92.434958] ? copy_mount_string+0x40/0x40 [ 92.439185] ? rcu_pm_notify+0xc0/0xc0 [ 92.443066] ? copy_mount_options+0x5f/0x380 [ 92.447457] ? rcu_read_lock_sched_held+0x108/0x120 [ 92.452456] ? kmem_cache_alloc_trace+0x616/0x780 [ 92.457285] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 92.462809] ? _copy_from_user+0xdf/0x150 [ 92.466946] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 92.472464] ? copy_mount_options+0x285/0x380 [ 92.476949] ksys_mount+0x12d/0x140 [ 92.480564] SyS_mount+0x35/0x50 [ 92.483916] ? ksys_mount+0x140/0x140 [ 92.487707] do_syscall_64+0x29e/0x9d0 [ 92.491587] ? vmalloc_sync_all+0x30/0x30 [ 92.495720] ? _raw_spin_unlock_irq+0x27/0x70 [ 92.500199] ? finish_task_switch+0x1ca/0x820 [ 92.504679] ? syscall_return_slowpath+0x5c0/0x5c0 [ 92.509593] ? syscall_return_slowpath+0x30f/0x5c0 [ 92.514508] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 92.519862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 92.524694] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 92.529868] RIP: 0033:0x455279 [ 92.533048] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 92.540740] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 92.547992] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/12 00:58:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./.ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:23 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='.0file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 92.555246] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 92.562500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 92.569757] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000011 2018/04/12 00:58:23 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:23 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:23 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:23 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='.//ile0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:23 executing program 1 (fault-call:5 fault-nth:18): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 92.804426] FAULT_INJECTION: forcing a failure. [ 92.804426] name failslab, interval 1, probability 0, space 0, times 0 [ 92.815910] CPU: 1 PID: 8765 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 92.822751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.832102] Call Trace: [ 92.834705] dump_stack+0x1b9/0x294 [ 92.838341] ? dump_stack_print_info.cold.2+0x52/0x52 [ 92.843535] ? perf_trace_lock_acquire+0xe3/0x980 [ 92.848388] ? __save_stack_trace+0x7e/0xd0 [ 92.852727] should_fail.cold.4+0xa/0x1a [ 92.856802] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 92.861916] ? save_stack+0x43/0xd0 [ 92.865553] ? kasan_kmalloc+0xc4/0xe0 [ 92.869448] ? kmem_cache_alloc_trace+0x152/0x780 [ 92.874299] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 92.879488] ? __list_lru_init+0x456/0x790 [ 92.883719] ? sget_userns+0x6d9/0xf20 [ 92.887590] ? graph_lock+0x170/0x170 [ 92.891377] ? do_mount+0x564/0x3070 [ 92.895071] ? ksys_mount+0x12d/0x140 [ 92.898855] ? SyS_mount+0x35/0x50 [ 92.902382] ? do_syscall_64+0x29e/0x9d0 [ 92.906431] ? find_held_lock+0x36/0x1c0 [ 92.910477] ? __lock_is_held+0xb5/0x140 [ 92.914534] ? check_same_owner+0x320/0x320 [ 92.918843] ? rcu_note_context_switch+0x710/0x710 [ 92.923760] __should_failslab+0x124/0x180 [ 92.927984] should_failslab+0x9/0x14 [ 92.931770] kmem_cache_alloc_trace+0x2cb/0x780 [ 92.936424] ? __kmalloc_node+0x33/0x70 [ 92.940381] ? __kmalloc_node+0x33/0x70 [ 92.944343] ? rcu_read_lock_sched_held+0x108/0x120 [ 92.949348] __memcg_init_list_lru_node+0x17d/0x2c0 [ 92.954353] ? kvfree_rcu+0x20/0x20 [ 92.957967] ? __kmalloc_node+0x47/0x70 [ 92.961934] __list_lru_init+0x456/0x790 [ 92.965983] ? list_lru_destroy+0x4c0/0x4c0 [ 92.970296] ? mark_held_locks+0xc9/0x160 [ 92.974432] ? __raw_spin_lock_init+0x1c/0x100 [ 92.978999] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 92.984021] ? __lockdep_init_map+0x105/0x590 [ 92.988517] ? lockdep_init_map+0x9/0x10 [ 92.992566] sget_userns+0x6d9/0xf20 [ 92.996264] ? set_anon_super+0x20/0x20 [ 93.000223] ? get_empty_filp.cold.7+0x3e/0x3e [ 93.004793] ? destroy_unused_super.part.9+0x100/0x100 [ 93.010060] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 93.015065] ? kasan_check_read+0x11/0x20 [ 93.019197] ? rcu_pm_notify+0xc0/0xc0 [ 93.023067] ? trace_hardirqs_off+0xd/0x10 [ 93.027288] ? cap_capable+0x1f9/0x260 [ 93.031163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.036685] ? security_capable+0x99/0xc0 [ 93.040823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.046346] ? ns_capable_common+0x13f/0x170 [ 93.050742] mount_ns+0x8f/0x1d0 [ 93.054094] ? rpc_pipe_release+0xb70/0xb70 [ 93.058401] rpc_mount+0x9e/0xd0 [ 93.061751] mount_fs+0xae/0x328 [ 93.065107] vfs_kern_mount.part.34+0xd4/0x4d0 [ 93.069678] ? may_umount+0xb0/0xb0 [ 93.073287] ? _raw_read_unlock+0x22/0x30 [ 93.077419] ? __get_fs_type+0x97/0xc0 [ 93.081293] do_mount+0x564/0x3070 [ 93.084823] ? copy_mount_string+0x40/0x40 [ 93.089045] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 93.094050] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 93.098796] ? retint_kernel+0x10/0x10 [ 93.102673] ? copy_mount_options+0x1f0/0x380 [ 93.107154] ? copy_mount_options+0x1fa/0x380 [ 93.111633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.117155] ? copy_mount_options+0x285/0x380 [ 93.121638] ksys_mount+0x12d/0x140 [ 93.125252] SyS_mount+0x35/0x50 [ 93.128607] ? ksys_mount+0x140/0x140 [ 93.132392] do_syscall_64+0x29e/0x9d0 [ 93.136265] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 93.141093] ? syscall_return_slowpath+0x5c0/0x5c0 [ 93.146016] ? syscall_return_slowpath+0x30f/0x5c0 [ 93.150938] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 93.156288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.161119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 93.166289] RIP: 0033:0x455279 [ 93.169461] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 93.177160] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 93.184414] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 93.191664] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 93.198918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 93.206169] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000012 2018/04/12 00:58:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./.ile1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:24 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file-\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 1 (fault-call:5 fault-nth:19): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 93.363589] FAULT_INJECTION: forcing a failure. [ 93.363589] name failslab, interval 1, probability 0, space 0, times 0 [ 93.374923] CPU: 1 PID: 8794 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 93.381769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.391123] Call Trace: [ 93.393722] dump_stack+0x1b9/0x294 [ 93.397365] ? dump_stack_print_info.cold.2+0x52/0x52 [ 93.402562] ? perf_trace_lock_acquire+0xe3/0x980 [ 93.407414] ? __save_stack_trace+0x7e/0xd0 [ 93.411756] should_fail.cold.4+0xa/0x1a [ 93.415831] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 93.420945] ? save_stack+0x43/0xd0 [ 93.424582] ? kasan_kmalloc+0xc4/0xe0 [ 93.428479] ? kmem_cache_alloc_trace+0x152/0x780 [ 93.433333] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 93.438527] ? __list_lru_init+0x456/0x790 [ 93.442771] ? sget_userns+0x6d9/0xf20 [ 93.446664] ? graph_lock+0x170/0x170 [ 93.450476] ? do_mount+0x564/0x3070 [ 93.454190] ? ksys_mount+0x12d/0x140 [ 93.457996] ? SyS_mount+0x35/0x50 [ 93.461549] ? do_syscall_64+0x29e/0x9d0 [ 93.465626] ? find_held_lock+0x36/0x1c0 [ 93.469700] ? __lock_is_held+0xb5/0x140 [ 93.473785] ? check_same_owner+0x320/0x320 [ 93.478123] ? rcu_note_context_switch+0x710/0x710 [ 93.483065] __should_failslab+0x124/0x180 [ 93.487309] should_failslab+0x9/0x14 [ 93.491114] kmem_cache_alloc_trace+0x2cb/0x780 [ 93.495793] ? __kmalloc_node+0x33/0x70 [ 93.499776] ? __kmalloc_node+0x33/0x70 [ 93.503762] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.508798] __memcg_init_list_lru_node+0x17d/0x2c0 [ 93.514277] ? kvfree_rcu+0x20/0x20 [ 93.517913] ? __kmalloc_node+0x47/0x70 [ 93.521904] __list_lru_init+0x456/0x790 [ 93.525976] ? list_lru_destroy+0x4c0/0x4c0 [ 93.530304] ? mark_held_locks+0xc9/0x160 [ 93.534469] ? __raw_spin_lock_init+0x1c/0x100 [ 93.539057] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 93.544074] ? __lockdep_init_map+0x105/0x590 [ 93.548581] ? lockdep_init_map+0x9/0x10 [ 93.552648] sget_userns+0x6d9/0xf20 [ 93.556362] ? set_anon_super+0x20/0x20 [ 93.560343] ? get_empty_filp.cold.7+0x3e/0x3e [ 93.564931] ? destroy_unused_super.part.9+0x100/0x100 [ 93.570217] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 93.575240] ? kasan_check_read+0x11/0x20 [ 93.579395] ? rcu_pm_notify+0xc0/0xc0 [ 93.583365] ? trace_hardirqs_off+0xd/0x10 [ 93.587592] ? cap_capable+0x1f9/0x260 [ 93.591476] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.597001] ? security_capable+0x99/0xc0 [ 93.601146] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.606928] ? ns_capable_common+0x13f/0x170 [ 93.611327] mount_ns+0x8f/0x1d0 [ 93.614679] ? rpc_pipe_release+0xb70/0xb70 [ 93.618985] rpc_mount+0x9e/0xd0 [ 93.622338] mount_fs+0xae/0x328 [ 93.625695] vfs_kern_mount.part.34+0xd4/0x4d0 [ 93.630263] ? may_umount+0xb0/0xb0 [ 93.633874] ? _raw_read_unlock+0x22/0x30 [ 93.638014] ? __get_fs_type+0x97/0xc0 [ 93.641903] do_mount+0x564/0x3070 [ 93.645427] ? do_raw_spin_unlock+0x9e/0x2e0 [ 93.649825] ? copy_mount_string+0x40/0x40 [ 93.654048] ? rcu_pm_notify+0xc0/0xc0 [ 93.657925] ? copy_mount_options+0x5f/0x380 [ 93.662315] ? rcu_read_lock_sched_held+0x108/0x120 [ 93.667318] ? kmem_cache_alloc_trace+0x616/0x780 [ 93.672147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 93.677672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 93.683191] ? copy_mount_options+0x285/0x380 [ 93.687670] ksys_mount+0x12d/0x140 [ 93.691282] SyS_mount+0x35/0x50 [ 93.694630] ? ksys_mount+0x140/0x140 [ 93.698419] do_syscall_64+0x29e/0x9d0 [ 93.702294] ? vmalloc_sync_all+0x30/0x30 [ 93.706427] ? _raw_spin_unlock_irq+0x27/0x70 [ 93.710910] ? finish_task_switch+0x1ca/0x820 [ 93.715394] ? syscall_return_slowpath+0x5c0/0x5c0 [ 93.720308] ? syscall_return_slowpath+0x30f/0x5c0 [ 93.725223] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 93.730574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 93.735404] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 93.740580] RIP: 0033:0x455279 [ 93.743756] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 93.751451] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 2018/04/12 00:58:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file#\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x0, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:24 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='.//ile1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file+\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 93.758702] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 93.765953] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 93.773205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 93.780458] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000013 2018/04/12 00:58:24 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653002", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530c0", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 1 (fault-call:5 fault-nth:20): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:24 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:24 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 94.104107] FAULT_INJECTION: forcing a failure. [ 94.104107] name failslab, interval 1, probability 0, space 0, times 0 [ 94.115461] CPU: 0 PID: 8844 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 94.122317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.131681] Call Trace: [ 94.134295] dump_stack+0x1b9/0x294 [ 94.137953] ? dump_stack_print_info.cold.2+0x52/0x52 [ 94.143193] should_fail.cold.4+0xa/0x1a [ 94.147286] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 94.152414] ? print_usage_bug+0xc0/0xc0 [ 94.156498] ? graph_lock+0x170/0x170 [ 94.160313] ? lock_downgrade+0x8e0/0x8e0 [ 94.164489] ? find_held_lock+0x36/0x1c0 [ 94.168581] ? __lock_is_held+0xb5/0x140 [ 94.172688] ? check_same_owner+0x320/0x320 [ 94.177028] ? __might_sleep+0x95/0x190 [ 94.181029] ? rcu_note_context_switch+0x710/0x710 [ 94.185973] __should_failslab+0x124/0x180 [ 94.190210] should_failslab+0x9/0x14 [ 94.194018] __kmalloc+0x2c8/0x760 [ 94.197554] ? __kmalloc_node+0x47/0x70 [ 94.201516] ? __list_lru_init+0xdd/0x790 [ 94.205657] __list_lru_init+0xdd/0x790 [ 94.209624] ? list_lru_destroy+0x4c0/0x4c0 [ 94.213941] ? mark_held_locks+0xc9/0x160 [ 94.218081] ? __raw_spin_lock_init+0x1c/0x100 [ 94.222650] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 94.227657] ? lockdep_init_map+0x9/0x10 [ 94.231724] sget_userns+0x706/0xf20 [ 94.235426] ? set_anon_super+0x20/0x20 [ 94.239388] ? get_empty_filp.cold.7+0x3e/0x3e [ 94.243957] ? destroy_unused_super.part.9+0x100/0x100 [ 94.249225] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 94.254233] ? kasan_check_read+0x11/0x20 [ 94.258371] ? rcu_pm_notify+0xc0/0xc0 [ 94.262254] ? trace_hardirqs_off+0xd/0x10 [ 94.266482] ? cap_capable+0x1f9/0x260 [ 94.270364] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.275889] ? security_capable+0x99/0xc0 [ 94.280039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.285562] ? ns_capable_common+0x13f/0x170 [ 94.289960] mount_ns+0x8f/0x1d0 [ 94.293312] ? rpc_pipe_release+0xb70/0xb70 [ 94.297623] rpc_mount+0x9e/0xd0 [ 94.300980] mount_fs+0xae/0x328 [ 94.304338] vfs_kern_mount.part.34+0xd4/0x4d0 [ 94.308908] ? may_umount+0xb0/0xb0 [ 94.312522] ? _raw_read_unlock+0x22/0x30 [ 94.316654] ? __get_fs_type+0x97/0xc0 [ 94.320532] do_mount+0x564/0x3070 [ 94.324065] ? copy_mount_string+0x40/0x40 [ 94.328284] ? rcu_pm_notify+0xc0/0xc0 [ 94.332165] ? copy_mount_options+0x5f/0x380 [ 94.336559] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.341560] ? kmem_cache_alloc_trace+0x616/0x780 [ 94.346393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 94.351914] ? _copy_from_user+0xdf/0x150 [ 94.356062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.361585] ? copy_mount_options+0x285/0x380 [ 94.366069] ksys_mount+0x12d/0x140 [ 94.369687] SyS_mount+0x35/0x50 [ 94.373041] ? ksys_mount+0x140/0x140 [ 94.376833] do_syscall_64+0x29e/0x9d0 [ 94.380712] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 94.385546] ? syscall_return_slowpath+0x5c0/0x5c0 [ 94.390462] ? syscall_return_slowpath+0x30f/0x5c0 [ 94.395391] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 94.400768] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 94.405607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 94.410781] RIP: 0033:0x455279 [ 94.413955] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 94.421650] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 94.428904] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 94.436159] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 94.443420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:25 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:25 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:25 executing program 1 (fault-call:5 fault-nth:21): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c65ffff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530f5", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 94.450683] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000014 [ 94.543070] FAULT_INJECTION: forcing a failure. [ 94.543070] name failslab, interval 1, probability 0, space 0, times 0 [ 94.554446] CPU: 1 PID: 8867 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 94.561297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.570653] Call Trace: [ 94.573251] dump_stack+0x1b9/0x294 [ 94.576899] ? dump_stack_print_info.cold.2+0x52/0x52 [ 94.582096] ? perf_trace_lock_acquire+0xe3/0x980 [ 94.586949] ? perf_trace_lock+0x900/0x900 [ 94.591202] should_fail.cold.4+0xa/0x1a [ 94.595281] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 94.600404] ? print_usage_bug+0xc0/0xc0 [ 94.604479] ? graph_lock+0x170/0x170 [ 94.608289] ? lock_downgrade+0x8e0/0x8e0 [ 94.612447] ? find_held_lock+0x36/0x1c0 [ 94.616523] ? __lock_is_held+0xb5/0x140 [ 94.620610] ? check_same_owner+0x320/0x320 [ 94.624942] ? __might_sleep+0x95/0x190 [ 94.628929] ? rcu_note_context_switch+0x710/0x710 [ 94.633877] __should_failslab+0x124/0x180 [ 94.638124] should_failslab+0x9/0x14 2018/04/12 00:58:25 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0h', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:25 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:25 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 94.641927] __kmalloc+0x2c8/0x760 [ 94.645476] ? __kmalloc_node+0x47/0x70 [ 94.649463] ? __list_lru_init+0xdd/0x790 [ 94.653629] __list_lru_init+0xdd/0x790 [ 94.657623] ? list_lru_destroy+0x4c0/0x4c0 [ 94.661959] ? mark_held_locks+0xc9/0x160 [ 94.666120] ? __raw_spin_lock_init+0x1c/0x100 [ 94.670713] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 94.675743] ? lockdep_init_map+0x9/0x10 [ 94.679820] sget_userns+0x706/0xf20 [ 94.683541] ? set_anon_super+0x20/0x20 [ 94.687522] ? get_empty_filp.cold.7+0x3e/0x3e [ 94.692098] ? destroy_unused_super.part.9+0x100/0x100 [ 94.697384] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 94.702397] ? kasan_check_read+0x11/0x20 [ 94.706540] ? rcu_pm_notify+0xc0/0xc0 [ 94.710413] ? trace_hardirqs_off+0xd/0x10 [ 94.714638] ? cap_capable+0x1f9/0x260 [ 94.718514] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.724041] ? security_capable+0x99/0xc0 [ 94.728179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.733701] ? ns_capable_common+0x13f/0x170 [ 94.738116] mount_ns+0x8f/0x1d0 [ 94.741469] ? rpc_pipe_release+0xb70/0xb70 [ 94.745777] rpc_mount+0x9e/0xd0 [ 94.749129] mount_fs+0xae/0x328 [ 94.752487] vfs_kern_mount.part.34+0xd4/0x4d0 [ 94.757059] ? may_umount+0xb0/0xb0 [ 94.760677] ? _raw_read_unlock+0x22/0x30 [ 94.764810] ? __get_fs_type+0x97/0xc0 [ 94.768686] do_mount+0x564/0x3070 [ 94.772213] ? do_raw_spin_unlock+0x9e/0x2e0 [ 94.776607] ? copy_mount_string+0x40/0x40 [ 94.780825] ? rcu_pm_notify+0xc0/0xc0 [ 94.784711] ? copy_mount_options+0x5f/0x380 [ 94.789105] ? rcu_read_lock_sched_held+0x108/0x120 [ 94.794106] ? kmem_cache_alloc_trace+0x616/0x780 [ 94.798937] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 94.804464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 94.809986] ? copy_mount_options+0x285/0x380 [ 94.814472] ksys_mount+0x12d/0x140 [ 94.818083] SyS_mount+0x35/0x50 [ 94.821434] ? ksys_mount+0x140/0x140 [ 94.825222] do_syscall_64+0x29e/0x9d0 [ 94.829095] ? vmalloc_sync_all+0x30/0x30 [ 94.833227] ? _raw_spin_unlock_irq+0x27/0x70 [ 94.837711] ? finish_task_switch+0x1ca/0x820 [ 94.842192] ? syscall_return_slowpath+0x5c0/0x5c0 [ 94.847112] ? syscall_return_slowpath+0x30f/0x5c0 [ 94.852036] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 94.857395] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 94.862223] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 94.867395] RIP: 0033:0x455279 [ 94.870569] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 94.878264] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 94.885519] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 94.892769] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 94.900024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 94.907282] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000015 2018/04/12 00:58:25 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:25 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:25 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:25 executing program 1 (fault-call:5 fault-nth:22): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 95.118891] FAULT_INJECTION: forcing a failure. [ 95.118891] name failslab, interval 1, probability 0, space 0, times 0 [ 95.130226] CPU: 1 PID: 8896 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 95.137066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.146423] Call Trace: [ 95.149027] dump_stack+0x1b9/0x294 [ 95.152668] ? dump_stack_print_info.cold.2+0x52/0x52 [ 95.157864] ? perf_trace_lock_acquire+0xe3/0x980 [ 95.162719] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 95.167928] should_fail.cold.4+0xa/0x1a [ 95.172004] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 95.177119] ? unwind_get_return_address+0x61/0xa0 [ 95.182063] ? __save_stack_trace+0x7e/0xd0 [ 95.186393] ? graph_lock+0x170/0x170 [ 95.190210] ? find_held_lock+0x36/0x1c0 [ 95.194287] ? __lock_is_held+0xb5/0x140 [ 95.198374] ? check_same_owner+0x320/0x320 [ 95.202709] ? rcu_note_context_switch+0x710/0x710 [ 95.207658] __should_failslab+0x124/0x180 [ 95.211902] should_failslab+0x9/0x14 [ 95.215713] kmem_cache_alloc_trace+0x2cb/0x780 [ 95.220386] ? __kmalloc_node+0x33/0x70 [ 95.224368] ? __kmalloc_node+0x33/0x70 [ 95.228351] ? rcu_read_lock_sched_held+0x108/0x120 [ 95.233388] __memcg_init_list_lru_node+0x17d/0x2c0 [ 95.238418] ? kvfree_rcu+0x20/0x20 [ 95.242052] ? __kmalloc_node+0x47/0x70 [ 95.246043] __list_lru_init+0x456/0x790 [ 95.250114] ? list_lru_destroy+0x4c0/0x4c0 [ 95.254446] ? mark_held_locks+0xc9/0x160 [ 95.258606] ? __raw_spin_lock_init+0x1c/0x100 [ 95.263198] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 95.268232] ? lockdep_init_map+0x9/0x10 [ 95.272293] sget_userns+0x706/0xf20 [ 95.275993] ? set_anon_super+0x20/0x20 [ 95.279955] ? get_empty_filp.cold.7+0x3e/0x3e [ 95.284523] ? destroy_unused_super.part.9+0x100/0x100 [ 95.289795] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 95.294801] ? kasan_check_read+0x11/0x20 [ 95.298937] ? rcu_pm_notify+0xc0/0xc0 [ 95.302811] ? trace_hardirqs_off+0xd/0x10 [ 95.307044] ? cap_capable+0x1f9/0x260 [ 95.310918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.316434] ? security_capable+0x99/0xc0 [ 95.320567] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.326087] ? ns_capable_common+0x13f/0x170 [ 95.330481] mount_ns+0x8f/0x1d0 [ 95.333828] ? rpc_pipe_release+0xb70/0xb70 [ 95.338130] rpc_mount+0x9e/0xd0 [ 95.341480] mount_fs+0xae/0x328 [ 95.344833] vfs_kern_mount.part.34+0xd4/0x4d0 [ 95.349400] ? may_umount+0xb0/0xb0 [ 95.353008] ? _raw_read_unlock+0x22/0x30 [ 95.357148] ? __get_fs_type+0x97/0xc0 [ 95.361028] do_mount+0x564/0x3070 [ 95.364563] ? copy_mount_string+0x40/0x40 [ 95.368791] ? rcu_pm_notify+0xc0/0xc0 [ 95.372663] ? copy_mount_options+0x5f/0x380 [ 95.377058] ? rcu_read_lock_sched_held+0x108/0x120 [ 95.382065] ? kmem_cache_alloc_trace+0x616/0x780 [ 95.386899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.392416] ? copy_mount_options+0x285/0x380 [ 95.396895] ksys_mount+0x12d/0x140 [ 95.400502] SyS_mount+0x35/0x50 [ 95.403862] ? ksys_mount+0x140/0x140 [ 95.407652] do_syscall_64+0x29e/0x9d0 [ 95.411522] ? vmalloc_sync_all+0x30/0x30 [ 95.415652] ? _raw_spin_unlock_irq+0x27/0x70 [ 95.420128] ? finish_task_switch+0x1ca/0x820 [ 95.424612] ? syscall_return_slowpath+0x5c0/0x5c0 [ 95.429524] ? syscall_return_slowpath+0x30f/0x5c0 [ 95.434440] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 95.439791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 95.444619] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 95.449788] RIP: 0033:0x455279 [ 95.452964] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 95.460742] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 2018/04/12 00:58:26 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:26 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65301d", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 1 (fault-call:5 fault-nth:23): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x0, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 95.467991] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 95.475245] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 95.482493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 95.489745] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000016 [ 95.605424] FAULT_INJECTION: forcing a failure. [ 95.605424] name failslab, interval 1, probability 0, space 0, times 0 [ 95.616792] CPU: 0 PID: 8927 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 95.623649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.633010] Call Trace: [ 95.635618] dump_stack+0x1b9/0x294 [ 95.639272] ? dump_stack_print_info.cold.2+0x52/0x52 [ 95.644483] ? kernel_text_address+0x79/0xf0 [ 95.648924] should_fail.cold.4+0xa/0x1a [ 95.653016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 95.658150] ? graph_lock+0x170/0x170 [ 95.661971] ? save_stack+0x43/0xd0 [ 95.665615] ? kasan_kmalloc+0xc4/0xe0 [ 95.669521] ? __list_lru_init+0xdd/0x790 [ 95.673693] ? find_held_lock+0x36/0x1c0 [ 95.677797] ? __lock_is_held+0xb5/0x140 [ 95.681900] ? check_same_owner+0x320/0x320 [ 95.686248] ? rcu_note_context_switch+0x710/0x710 [ 95.691206] __should_failslab+0x124/0x180 [ 95.695460] should_failslab+0x9/0x14 [ 95.699287] kmem_cache_alloc_node_trace+0x26f/0x770 [ 95.704405] ? mark_held_locks+0xc9/0x160 [ 95.708576] ? __raw_spin_lock_init+0x1c/0x100 [ 95.713189] __kmalloc_node+0x33/0x70 [ 95.717012] kvmalloc_node+0x6b/0x100 [ 95.720837] __list_lru_init+0x559/0x790 [ 95.724928] ? list_lru_destroy+0x4c0/0x4c0 [ 95.729269] ? mark_held_locks+0xc9/0x160 [ 95.733437] ? __raw_spin_lock_init+0x1c/0x100 [ 95.738037] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 95.743079] ? lockdep_init_map+0x9/0x10 [ 95.747163] sget_userns+0x706/0xf20 [ 95.750895] ? set_anon_super+0x20/0x20 [ 95.754899] ? get_empty_filp.cold.7+0x3e/0x3e [ 95.759508] ? destroy_unused_super.part.9+0x100/0x100 [ 95.764812] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 95.769849] ? kasan_check_read+0x11/0x20 [ 95.774015] ? rcu_pm_notify+0xc0/0xc0 [ 95.777916] ? trace_hardirqs_off+0xd/0x10 [ 95.782171] ? cap_capable+0x1f9/0x260 [ 95.786087] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.791640] ? security_capable+0x99/0xc0 [ 95.795814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.801362] ? ns_capable_common+0x13f/0x170 2018/04/12 00:58:26 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x0, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 95.805796] mount_ns+0x8f/0x1d0 [ 95.809175] ? rpc_pipe_release+0xb70/0xb70 [ 95.813516] rpc_mount+0x9e/0xd0 [ 95.816904] mount_fs+0xae/0x328 [ 95.820298] vfs_kern_mount.part.34+0xd4/0x4d0 [ 95.824899] ? may_umount+0xb0/0xb0 [ 95.828625] ? _raw_read_unlock+0x22/0x30 [ 95.832793] ? __get_fs_type+0x97/0xc0 [ 95.836707] do_mount+0x564/0x3070 [ 95.840260] ? do_raw_spin_unlock+0x9e/0x2e0 [ 95.844679] ? interrupt_entry+0xb1/0xf0 [ 95.848766] ? copy_mount_string+0x40/0x40 [ 95.853017] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 95.857798] ? retint_kernel+0x10/0x10 [ 95.861711] ? copy_mount_options+0x213/0x380 [ 95.866226] ? write_comp_data+0x1b/0x70 [ 95.870305] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 95.875858] ? copy_mount_options+0x285/0x380 [ 95.880379] ksys_mount+0x12d/0x140 [ 95.884026] SyS_mount+0x35/0x50 [ 95.887401] ? ksys_mount+0x140/0x140 [ 95.891217] do_syscall_64+0x29e/0x9d0 [ 95.895115] ? vmalloc_sync_all+0x30/0x30 [ 95.899274] ? _raw_spin_unlock_irq+0x27/0x70 [ 95.903788] ? finish_task_switch+0x1ca/0x820 [ 95.908302] ? syscall_return_slowpath+0x5c0/0x5c0 [ 95.913247] ? syscall_return_slowpath+0x30f/0x5c0 [ 95.918189] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 95.923571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 95.928445] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 95.933648] RIP: 0033:0x455279 [ 95.936850] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 95.944580] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 95.951862] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 95.959147] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 95.966427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 95.973707] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000017 2018/04/12 00:58:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653002", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:26 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531ff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 1 (fault-call:5 fault-nth:24): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:26 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 96.161270] FAULT_INJECTION: forcing a failure. [ 96.161270] name failslab, interval 1, probability 0, space 0, times 0 [ 96.172603] CPU: 0 PID: 8972 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 96.179455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.188824] Call Trace: [ 96.191432] dump_stack+0x1b9/0x294 [ 96.195095] ? dump_stack_print_info.cold.2+0x52/0x52 [ 96.200311] ? __save_stack_trace+0x7e/0xd0 [ 96.204673] should_fail.cold.4+0xa/0x1a [ 96.208766] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 96.213887] ? save_stack+0x43/0xd0 [ 96.217528] ? kasan_kmalloc+0xc4/0xe0 [ 96.221430] ? kmem_cache_alloc_trace+0x152/0x780 [ 96.226287] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 96.231492] ? __list_lru_init+0x456/0x790 [ 96.235743] ? sget_userns+0x706/0xf20 [ 96.239649] ? graph_lock+0x170/0x170 [ 96.243461] ? do_mount+0x564/0x3070 [ 96.247188] ? ksys_mount+0x12d/0x140 [ 96.251000] ? SyS_mount+0x35/0x50 [ 96.254564] ? do_syscall_64+0x29e/0x9d0 [ 96.258650] ? find_held_lock+0x36/0x1c0 [ 96.262748] ? __lock_is_held+0xb5/0x140 [ 96.266851] ? check_same_owner+0x320/0x320 [ 96.271201] ? rcu_note_context_switch+0x710/0x710 [ 96.276168] __should_failslab+0x124/0x180 [ 96.280427] should_failslab+0x9/0x14 [ 96.284246] kmem_cache_alloc_trace+0x2cb/0x780 [ 96.288930] ? __kmalloc_node+0x33/0x70 [ 96.292917] ? __kmalloc_node+0x33/0x70 [ 96.296912] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.301962] __memcg_init_list_lru_node+0x17d/0x2c0 [ 96.307009] ? kvfree_rcu+0x20/0x20 [ 96.310658] ? __kmalloc_node+0x47/0x70 [ 96.314671] __list_lru_init+0x456/0x790 [ 96.318764] ? list_lru_destroy+0x4c0/0x4c0 [ 96.323104] ? mark_held_locks+0xc9/0x160 [ 96.327276] ? __raw_spin_lock_init+0x1c/0x100 [ 96.331873] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 96.336912] ? lockdep_init_map+0x9/0x10 [ 96.340992] sget_userns+0x706/0xf20 [ 96.344724] ? set_anon_super+0x20/0x20 [ 96.348716] ? get_empty_filp.cold.7+0x3e/0x3e [ 96.353315] ? destroy_unused_super.part.9+0x100/0x100 2018/04/12 00:58:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:27 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:27 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:27 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 96.358613] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 96.363648] ? kasan_check_read+0x11/0x20 [ 96.367812] ? rcu_pm_notify+0xc0/0xc0 [ 96.371722] ? trace_hardirqs_off+0xd/0x10 [ 96.375978] ? cap_capable+0x1f9/0x260 [ 96.379896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 96.385449] ? security_capable+0x99/0xc0 [ 96.389621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 96.395175] ? ns_capable_common+0x13f/0x170 [ 96.399610] mount_ns+0x8f/0x1d0 [ 96.402993] ? rpc_pipe_release+0xb70/0xb70 [ 96.407337] rpc_mount+0x9e/0xd0 2018/04/12 00:58:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 96.410733] mount_fs+0xae/0x328 [ 96.414128] vfs_kern_mount.part.34+0xd4/0x4d0 [ 96.418735] ? may_umount+0xb0/0xb0 [ 96.422376] ? _raw_read_unlock+0x22/0x30 [ 96.426546] ? __get_fs_type+0x97/0xc0 [ 96.430456] do_mount+0x564/0x3070 [ 96.434025] ? copy_mount_string+0x40/0x40 [ 96.438278] ? rcu_pm_notify+0xc0/0xc0 [ 96.442188] ? copy_mount_options+0x5f/0x380 [ 96.446598] ? rcu_read_lock_sched_held+0x108/0x120 [ 96.451625] ? kmem_cache_alloc_trace+0x616/0x780 [ 96.456491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 2018/04/12 00:58:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0l', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 96.462046] ? _copy_from_user+0xdf/0x150 [ 96.466218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 96.471761] ? copy_mount_options+0x285/0x380 [ 96.476274] ksys_mount+0x12d/0x140 [ 96.479927] SyS_mount+0x35/0x50 [ 96.483308] ? ksys_mount+0x140/0x140 [ 96.487131] do_syscall_64+0x29e/0x9d0 [ 96.491028] ? vmalloc_sync_all+0x30/0x30 [ 96.497272] ? _raw_spin_unlock_irq+0x27/0x70 [ 96.501791] ? finish_task_switch+0x1ca/0x820 [ 96.506306] ? syscall_return_slowpath+0x5c0/0x5c0 [ 96.511254] ? syscall_return_slowpath+0x30f/0x5c0 [ 96.516206] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 96.521602] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 96.526475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 96.531691] RIP: 0033:0x455279 [ 96.534895] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 96.542626] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 96.549914] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/12 00:58:27 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0l', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 96.557202] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 96.564479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 96.571754] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000018 2018/04/12 00:58:27 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:27 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:27 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:27 executing program 1 (fault-call:5 fault-nth:25): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:27 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 96.924701] FAULT_INJECTION: forcing a failure. [ 96.924701] name failslab, interval 1, probability 0, space 0, times 0 [ 96.936083] CPU: 0 PID: 9043 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 96.942942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.952308] Call Trace: [ 96.954928] dump_stack+0x1b9/0x294 [ 96.958581] ? dump_stack_print_info.cold.2+0x52/0x52 [ 96.963769] ? __save_stack_trace+0x7e/0xd0 [ 96.968099] should_fail.cold.4+0xa/0x1a [ 96.972151] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 96.977240] ? save_stack+0x43/0xd0 [ 96.980854] ? kasan_kmalloc+0xc4/0xe0 [ 96.984726] ? kmem_cache_alloc_trace+0x152/0x780 [ 96.989555] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 96.994730] ? __list_lru_init+0x456/0x790 [ 96.998951] ? sget_userns+0x706/0xf20 [ 97.002824] ? graph_lock+0x170/0x170 [ 97.006609] ? do_mount+0x564/0x3070 [ 97.010306] ? ksys_mount+0x12d/0x140 [ 97.014097] ? SyS_mount+0x35/0x50 [ 97.017635] ? do_syscall_64+0x29e/0x9d0 [ 97.021689] ? find_held_lock+0x36/0x1c0 [ 97.025742] ? __lock_is_held+0xb5/0x140 [ 97.029801] ? check_same_owner+0x320/0x320 [ 97.034113] ? rcu_note_context_switch+0x710/0x710 [ 97.039047] __should_failslab+0x124/0x180 [ 97.043281] should_failslab+0x9/0x14 [ 97.047069] kmem_cache_alloc_trace+0x2cb/0x780 [ 97.051723] ? __kmalloc_node+0x33/0x70 [ 97.055687] ? __kmalloc_node+0x33/0x70 [ 97.059648] ? rcu_read_lock_sched_held+0x108/0x120 [ 97.064674] __memcg_init_list_lru_node+0x17d/0x2c0 [ 97.069688] ? kvfree_rcu+0x20/0x20 [ 97.073310] ? __kmalloc_node+0x47/0x70 [ 97.077280] __list_lru_init+0x456/0x790 [ 97.081332] ? list_lru_destroy+0x4c0/0x4c0 [ 97.085639] ? mark_held_locks+0xc9/0x160 [ 97.089778] ? __raw_spin_lock_init+0x1c/0x100 [ 97.094347] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 97.099354] ? lockdep_init_map+0x9/0x10 [ 97.103406] sget_userns+0x706/0xf20 [ 97.107105] ? set_anon_super+0x20/0x20 [ 97.111069] ? get_empty_filp.cold.7+0x3e/0x3e [ 97.115637] ? destroy_unused_super.part.9+0x100/0x100 [ 97.120909] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 97.125915] ? kasan_check_read+0x11/0x20 [ 97.130055] ? rcu_pm_notify+0xc0/0xc0 [ 97.133926] ? trace_hardirqs_off+0xd/0x10 [ 97.138150] ? cap_capable+0x1f9/0x260 [ 97.142042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 97.147567] ? security_capable+0x99/0xc0 [ 97.151704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 97.157225] ? ns_capable_common+0x13f/0x170 [ 97.161626] mount_ns+0x8f/0x1d0 [ 97.164984] ? rpc_pipe_release+0xb70/0xb70 [ 97.170031] rpc_mount+0x9e/0xd0 [ 97.173406] mount_fs+0xae/0x328 [ 97.176772] vfs_kern_mount.part.34+0xd4/0x4d0 [ 97.181356] ? may_umount+0xb0/0xb0 [ 97.184970] ? _raw_read_unlock+0x22/0x30 [ 97.189102] ? __get_fs_type+0x97/0xc0 [ 97.192980] do_mount+0x564/0x3070 [ 97.196521] ? copy_mount_string+0x40/0x40 [ 97.200744] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 97.205498] ? retint_kernel+0x10/0x10 [ 97.209399] ? copy_mount_options+0x1a1/0x380 [ 97.213897] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 97.218725] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 97.224247] ? copy_mount_options+0x285/0x380 [ 97.228737] ksys_mount+0x12d/0x140 [ 97.232360] SyS_mount+0x35/0x50 [ 97.235711] ? ksys_mount+0x140/0x140 [ 97.239502] do_syscall_64+0x29e/0x9d0 [ 97.243373] ? vmalloc_sync_all+0x30/0x30 [ 97.247505] ? _raw_spin_unlock_irq+0x27/0x70 [ 97.251986] ? finish_task_switch+0x1ca/0x820 [ 97.256472] ? syscall_return_slowpath+0x5c0/0x5c0 [ 97.261390] ? syscall_return_slowpath+0x30f/0x5c0 [ 97.266321] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 97.271675] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 97.276510] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.281684] RIP: 0033:0x455279 [ 97.284858] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 97.292558] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 97.299818] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 97.307097] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 97.314358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c653104", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0x0, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653097", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65309c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 1 (fault-call:5 fault-nth:26): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 97.321619] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000019 [ 97.437203] FAULT_INJECTION: forcing a failure. [ 97.437203] name failslab, interval 1, probability 0, space 0, times 0 [ 97.449148] CPU: 1 PID: 9067 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 97.455992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.465345] Call Trace: [ 97.467948] dump_stack+0x1b9/0x294 [ 97.471590] ? dump_stack_print_info.cold.2+0x52/0x52 [ 97.476788] ? perf_trace_lock_acquire+0xe3/0x980 [ 97.481636] ? __save_stack_trace+0x7e/0xd0 [ 97.485976] should_fail.cold.4+0xa/0x1a [ 97.490053] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 97.495164] ? save_stack+0x43/0xd0 [ 97.498797] ? kasan_kmalloc+0xc4/0xe0 [ 97.502689] ? kmem_cache_alloc_trace+0x152/0x780 [ 97.507542] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 97.513205] ? __list_lru_init+0x456/0x790 [ 97.517448] ? sget_userns+0x706/0xf20 [ 97.521343] ? graph_lock+0x170/0x170 [ 97.525160] ? do_mount+0x564/0x3070 [ 97.528879] ? ksys_mount+0x12d/0x140 [ 97.532689] ? SyS_mount+0x35/0x50 2018/04/12 00:58:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531f6", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 97.536243] ? do_syscall_64+0x29e/0x9d0 [ 97.540315] ? find_held_lock+0x36/0x1c0 [ 97.544391] ? __lock_is_held+0xb5/0x140 [ 97.548477] ? check_same_owner+0x320/0x320 [ 97.552814] ? rcu_note_context_switch+0x710/0x710 [ 97.557760] __should_failslab+0x124/0x180 [ 97.562007] should_failslab+0x9/0x14 [ 97.565816] kmem_cache_alloc_trace+0x2cb/0x780 [ 97.570498] ? __kmalloc_node+0x33/0x70 [ 97.574484] ? __kmalloc_node+0x33/0x70 [ 97.578468] ? rcu_read_lock_sched_held+0x108/0x120 [ 97.583505] __memcg_init_list_lru_node+0x17d/0x2c0 [ 97.588538] ? kvfree_rcu+0x20/0x20 [ 97.592175] ? __kmalloc_node+0x47/0x70 [ 97.596170] __list_lru_init+0x456/0x790 [ 97.600252] ? list_lru_destroy+0x4c0/0x4c0 [ 97.604591] ? mark_held_locks+0xc9/0x160 [ 97.608753] ? __raw_spin_lock_init+0x1c/0x100 [ 97.613345] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 97.618375] ? lockdep_init_map+0x9/0x10 [ 97.622446] sget_userns+0x706/0xf20 [ 97.626164] ? set_anon_super+0x20/0x20 [ 97.630146] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/12 00:58:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 97.634734] ? destroy_unused_super.part.9+0x100/0x100 [ 97.640021] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 97.645046] ? kasan_check_read+0x11/0x20 [ 97.649206] ? rcu_pm_notify+0xc0/0xc0 [ 97.653097] ? trace_hardirqs_off+0xd/0x10 [ 97.657349] ? cap_capable+0x1f9/0x260 [ 97.661253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 97.667058] ? security_capable+0x99/0xc0 [ 97.671219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 97.676772] ? ns_capable_common+0x13f/0x170 [ 97.681197] mount_ns+0x8f/0x1d0 [ 97.684571] ? rpc_pipe_release+0xb70/0xb70 [ 97.688902] rpc_mount+0x9e/0xd0 [ 97.692279] mount_fs+0xae/0x328 [ 97.695665] vfs_kern_mount.part.34+0xd4/0x4d0 [ 97.700260] ? may_umount+0xb0/0xb0 [ 97.703895] ? _raw_read_unlock+0x22/0x30 [ 97.708046] ? __get_fs_type+0x97/0xc0 [ 97.711946] do_mount+0x564/0x3070 [ 97.715492] ? do_raw_spin_unlock+0x9e/0x2e0 [ 97.719908] ? copy_mount_string+0x40/0x40 [ 97.724147] ? rcu_pm_notify+0xc0/0xc0 [ 97.728049] ? copy_mount_options+0x5f/0x380 [ 97.732463] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/12 00:58:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653004", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 97.737486] ? kmem_cache_alloc_trace+0x616/0x780 [ 97.742341] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 97.747893] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 97.753438] ? copy_mount_options+0x285/0x380 [ 97.757944] ksys_mount+0x12d/0x140 [ 97.761580] SyS_mount+0x35/0x50 [ 97.764948] ? ksys_mount+0x140/0x140 [ 97.768765] do_syscall_64+0x29e/0x9d0 [ 97.772661] ? vmalloc_sync_all+0x30/0x30 [ 97.776809] ? _raw_spin_unlock_irq+0x27/0x70 [ 97.781313] ? finish_task_switch+0x1ca/0x820 [ 97.785815] ? syscall_return_slowpath+0x5c0/0x5c0 [ 97.790754] ? syscall_return_slowpath+0x30f/0x5c0 [ 97.795694] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 97.801071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 97.805926] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 97.811104] RIP: 0033:0x455279 [ 97.814279] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 97.821974] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 97.829228] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/12 00:58:28 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 97.836481] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 97.843735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 97.850986] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001a 2018/04/12 00:58:28 executing program 1 (fault-call:5 fault-nth:27): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x0, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531ff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 98.120986] FAULT_INJECTION: forcing a failure. [ 98.120986] name failslab, interval 1, probability 0, space 0, times 0 [ 98.132395] CPU: 0 PID: 9123 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 98.139256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.148623] Call Trace: [ 98.151237] dump_stack+0x1b9/0x294 [ 98.154900] ? dump_stack_print_info.cold.2+0x52/0x52 [ 98.160118] ? __save_stack_trace+0x7e/0xd0 [ 98.164475] should_fail.cold.4+0xa/0x1a [ 98.168740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 98.173861] ? save_stack+0x43/0xd0 [ 98.177510] ? kasan_kmalloc+0xc4/0xe0 [ 98.181414] ? kmem_cache_alloc_trace+0x152/0x780 [ 98.186303] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 98.191517] ? __list_lru_init+0x456/0x790 [ 98.195767] ? sget_userns+0x706/0xf20 [ 98.199679] ? graph_lock+0x170/0x170 [ 98.203497] ? do_mount+0x564/0x3070 [ 98.207225] ? ksys_mount+0x12d/0x140 [ 98.211038] ? SyS_mount+0x35/0x50 [ 98.214600] ? do_syscall_64+0x29e/0x9d0 [ 98.218691] ? find_held_lock+0x36/0x1c0 [ 98.222785] ? __lock_is_held+0xb5/0x140 [ 98.226980] ? check_same_owner+0x320/0x320 [ 98.231330] ? rcu_note_context_switch+0x710/0x710 [ 98.236293] __should_failslab+0x124/0x180 [ 98.240562] should_failslab+0x9/0x14 [ 98.244393] kmem_cache_alloc_trace+0x2cb/0x780 [ 98.249081] ? __kmalloc_node+0x33/0x70 [ 98.253074] ? __kmalloc_node+0x33/0x70 [ 98.257071] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.262133] __memcg_init_list_lru_node+0x17d/0x2c0 [ 98.267180] ? kvfree_rcu+0x20/0x20 2018/04/12 00:58:28 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:28 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 98.270832] ? __kmalloc_node+0x47/0x70 [ 98.274849] __list_lru_init+0x456/0x790 [ 98.278944] ? list_lru_destroy+0x4c0/0x4c0 [ 98.283284] ? mark_held_locks+0xc9/0x160 [ 98.287455] ? __raw_spin_lock_init+0x1c/0x100 [ 98.292059] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 98.297102] ? lockdep_init_map+0x9/0x10 [ 98.301185] sget_userns+0x706/0xf20 [ 98.304912] ? set_anon_super+0x20/0x20 [ 98.308908] ? get_empty_filp.cold.7+0x3e/0x3e [ 98.313512] ? destroy_unused_super.part.9+0x100/0x100 [ 98.318820] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 98.323865] ? kasan_check_read+0x11/0x20 [ 98.328035] ? rcu_pm_notify+0xc0/0xc0 [ 98.331922] ? trace_hardirqs_off+0xd/0x10 [ 98.336157] ? cap_capable+0x1f9/0x260 [ 98.340057] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.345598] ? security_capable+0x99/0xc0 [ 98.349744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.355271] ? ns_capable_common+0x13f/0x170 [ 98.359676] mount_ns+0x8f/0x1d0 [ 98.363040] ? rpc_pipe_release+0xb70/0xb70 [ 98.367359] rpc_mount+0x9e/0xd0 [ 98.370722] mount_fs+0xae/0x328 [ 98.374091] vfs_kern_mount.part.34+0xd4/0x4d0 [ 98.378666] ? may_umount+0xb0/0xb0 [ 98.382283] ? _raw_read_unlock+0x22/0x30 [ 98.386424] ? __get_fs_type+0x97/0xc0 [ 98.390307] do_mount+0x564/0x3070 [ 98.393847] ? copy_mount_string+0x40/0x40 [ 98.398071] ? rcu_pm_notify+0xc0/0xc0 [ 98.401960] ? copy_mount_options+0x5f/0x380 [ 98.406356] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.411363] ? kmem_cache_alloc_trace+0x616/0x780 [ 98.416201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 98.421729] ? _copy_from_user+0xdf/0x150 [ 98.425872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.431400] ? copy_mount_options+0x285/0x380 [ 98.435890] ksys_mount+0x12d/0x140 [ 98.439509] SyS_mount+0x35/0x50 [ 98.442865] ? ksys_mount+0x140/0x140 [ 98.446661] do_syscall_64+0x29e/0x9d0 [ 98.450542] ? vmalloc_sync_all+0x30/0x30 [ 98.454678] ? _raw_spin_unlock_irq+0x27/0x70 [ 98.459168] ? finish_task_switch+0x1ca/0x820 [ 98.463658] ? syscall_return_slowpath+0x5c0/0x5c0 [ 98.468581] ? syscall_return_slowpath+0x30f/0x5c0 [ 98.473504] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 98.478863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.483704] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 98.488883] RIP: 0033:0x455279 [ 98.492059] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.499760] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 98.507022] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 98.514285] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 98.521545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 98.528813] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001b 2018/04/12 00:58:29 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:29 executing program 1 (fault-call:5 fault-nth:28): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:29 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:29 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x0, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 98.726173] FAULT_INJECTION: forcing a failure. [ 98.726173] name failslab, interval 1, probability 0, space 0, times 0 [ 98.737571] CPU: 1 PID: 9162 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 98.744416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.753771] Call Trace: [ 98.756372] dump_stack+0x1b9/0x294 [ 98.760019] ? dump_stack_print_info.cold.2+0x52/0x52 [ 98.765219] ? perf_trace_lock_acquire+0xe3/0x980 [ 98.770073] ? __save_stack_trace+0x7e/0xd0 [ 98.774411] should_fail.cold.4+0xa/0x1a [ 98.778487] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 98.783602] ? save_stack+0x43/0xd0 [ 98.787238] ? kasan_kmalloc+0xc4/0xe0 [ 98.791138] ? kmem_cache_alloc_trace+0x152/0x780 [ 98.795989] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 98.801194] ? __list_lru_init+0x456/0x790 [ 98.805444] ? sget_userns+0x706/0xf20 [ 98.809338] ? graph_lock+0x170/0x170 [ 98.813145] ? do_mount+0x564/0x3070 [ 98.816862] ? ksys_mount+0x12d/0x140 [ 98.820667] ? SyS_mount+0x35/0x50 2018/04/12 00:58:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:29 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:29 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 98.824220] ? do_syscall_64+0x29e/0x9d0 [ 98.828294] ? find_held_lock+0x36/0x1c0 [ 98.832371] ? __lock_is_held+0xb5/0x140 [ 98.836454] ? check_same_owner+0x320/0x320 [ 98.840786] ? rcu_note_context_switch+0x710/0x710 [ 98.845734] __should_failslab+0x124/0x180 [ 98.849977] should_failslab+0x9/0x14 [ 98.853793] kmem_cache_alloc_trace+0x2cb/0x780 [ 98.858471] ? __kmalloc_node+0x33/0x70 [ 98.862451] ? __kmalloc_node+0x33/0x70 [ 98.866436] ? rcu_read_lock_sched_held+0x108/0x120 [ 98.871471] __memcg_init_list_lru_node+0x17d/0x2c0 [ 98.876502] ? kvfree_rcu+0x20/0x20 [ 98.880141] ? __kmalloc_node+0x47/0x70 [ 98.884137] __list_lru_init+0x456/0x790 [ 98.888215] ? list_lru_destroy+0x4c0/0x4c0 [ 98.892545] ? mark_held_locks+0xc9/0x160 [ 98.896703] ? __raw_spin_lock_init+0x1c/0x100 [ 98.901292] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 98.906322] ? lockdep_init_map+0x9/0x10 [ 98.910389] sget_userns+0x706/0xf20 [ 98.914102] ? set_anon_super+0x20/0x20 [ 98.918082] ? get_empty_filp.cold.7+0x3e/0x3e 2018/04/12 00:58:29 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 98.922666] ? destroy_unused_super.part.9+0x100/0x100 [ 98.927951] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 98.932977] ? kasan_check_read+0x11/0x20 [ 98.937137] ? rcu_pm_notify+0xc0/0xc0 [ 98.941034] ? trace_hardirqs_off+0xd/0x10 [ 98.945282] ? cap_capable+0x1f9/0x260 [ 98.949179] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.954724] ? security_capable+0x99/0xc0 [ 98.958880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 98.964427] ? ns_capable_common+0x13f/0x170 [ 98.968846] mount_ns+0x8f/0x1d0 [ 98.972217] ? rpc_pipe_release+0xb70/0xb70 2018/04/12 00:58:29 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:29 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653003", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 98.976539] rpc_mount+0x9e/0xd0 [ 98.979907] mount_fs+0xae/0x328 [ 98.983289] vfs_kern_mount.part.34+0xd4/0x4d0 [ 98.987884] ? may_umount+0xb0/0xb0 [ 98.991514] ? _raw_read_unlock+0x22/0x30 [ 98.995669] ? __get_fs_type+0x97/0xc0 [ 98.999563] do_mount+0x564/0x3070 [ 99.003108] ? do_raw_spin_unlock+0x9e/0x2e0 [ 99.007525] ? copy_mount_string+0x40/0x40 [ 99.011767] ? rcu_pm_notify+0xc0/0xc0 [ 99.015670] ? copy_mount_options+0x5f/0x380 [ 99.020084] ? rcu_read_lock_sched_held+0x108/0x120 [ 99.025107] ? kmem_cache_alloc_trace+0x616/0x780 [ 99.029959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 99.035516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.041055] ? copy_mount_options+0x285/0x380 [ 99.045558] ksys_mount+0x12d/0x140 [ 99.049197] SyS_mount+0x35/0x50 [ 99.052568] ? ksys_mount+0x140/0x140 [ 99.056378] do_syscall_64+0x29e/0x9d0 [ 99.060272] ? vmalloc_sync_all+0x30/0x30 [ 99.064431] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.068936] ? finish_task_switch+0x1ca/0x820 [ 99.073444] ? syscall_return_slowpath+0x5c0/0x5c0 [ 99.078380] ? syscall_return_slowpath+0x30f/0x5c0 [ 99.083321] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 99.088697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.093557] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 99.098749] RIP: 0033:0x455279 [ 99.101936] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 99.109650] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 99.117008] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 99.124281] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 99.131550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 99.138824] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001c 2018/04/12 00:58:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65308f", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:30 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:30 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x0, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 1 (fault-call:5 fault-nth:29): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 99.343830] FAULT_INJECTION: forcing a failure. [ 99.343830] name failslab, interval 1, probability 0, space 0, times 0 [ 99.355147] CPU: 1 PID: 9219 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 99.361996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.371356] Call Trace: [ 99.373956] dump_stack+0x1b9/0x294 [ 99.377606] ? dump_stack_print_info.cold.2+0x52/0x52 [ 99.382812] ? perf_trace_lock_acquire+0xe3/0x980 [ 99.387662] ? __save_stack_trace+0x7e/0xd0 [ 99.392009] should_fail.cold.4+0xa/0x1a [ 99.396078] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 99.401176] ? save_stack+0x43/0xd0 [ 99.404792] ? kasan_kmalloc+0xc4/0xe0 [ 99.408664] ? kmem_cache_alloc_trace+0x152/0x780 [ 99.413497] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 99.418676] ? __list_lru_init+0x456/0x790 [ 99.422893] ? sget_userns+0x706/0xf20 [ 99.426764] ? graph_lock+0x170/0x170 [ 99.430551] ? do_mount+0x564/0x3070 [ 99.434249] ? ksys_mount+0x12d/0x140 [ 99.438037] ? SyS_mount+0x35/0x50 [ 99.441567] ? do_syscall_64+0x29e/0x9d0 [ 99.445615] ? find_held_lock+0x36/0x1c0 [ 99.449663] ? __lock_is_held+0xb5/0x140 [ 99.453719] ? check_same_owner+0x320/0x320 [ 99.458038] ? rcu_note_context_switch+0x710/0x710 [ 99.462967] __should_failslab+0x124/0x180 [ 99.467189] should_failslab+0x9/0x14 [ 99.470974] kmem_cache_alloc_trace+0x2cb/0x780 [ 99.475627] ? __kmalloc_node+0x33/0x70 [ 99.479583] ? __kmalloc_node+0x33/0x70 [ 99.483543] ? rcu_read_lock_sched_held+0x108/0x120 [ 99.488548] __memcg_init_list_lru_node+0x17d/0x2c0 [ 99.493552] ? kvfree_rcu+0x20/0x20 [ 99.497163] ? __kmalloc_node+0x47/0x70 [ 99.501128] __list_lru_init+0x456/0x790 [ 99.505180] ? list_lru_destroy+0x4c0/0x4c0 [ 99.509486] ? mark_held_locks+0xc9/0x160 [ 99.514015] ? __raw_spin_lock_init+0x1c/0x100 [ 99.518591] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 99.523597] ? lockdep_init_map+0x9/0x10 [ 99.527643] sget_userns+0x706/0xf20 [ 99.531342] ? set_anon_super+0x20/0x20 [ 99.535303] ? get_empty_filp.cold.7+0x3e/0x3e [ 99.539869] ? destroy_unused_super.part.9+0x100/0x100 [ 99.545136] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 99.550138] ? kasan_check_read+0x11/0x20 [ 99.554272] ? rcu_pm_notify+0xc0/0xc0 [ 99.558141] ? trace_hardirqs_off+0xd/0x10 [ 99.562367] ? cap_capable+0x1f9/0x260 [ 99.566243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.571768] ? security_capable+0x99/0xc0 [ 99.575904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.581427] ? ns_capable_common+0x13f/0x170 [ 99.585822] mount_ns+0x8f/0x1d0 [ 99.589174] ? rpc_pipe_release+0xb70/0xb70 [ 99.593482] rpc_mount+0x9e/0xd0 [ 99.596836] mount_fs+0xae/0x328 [ 99.600193] vfs_kern_mount.part.34+0xd4/0x4d0 [ 99.604763] ? may_umount+0xb0/0xb0 [ 99.608381] ? _raw_read_unlock+0x22/0x30 [ 99.612514] ? __get_fs_type+0x97/0xc0 [ 99.616388] do_mount+0x564/0x3070 [ 99.619915] ? copy_mount_string+0x40/0x40 [ 99.624135] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 99.629059] ? retint_kernel+0x10/0x10 [ 99.632934] ? copy_mount_options+0x1a1/0x380 [ 99.637420] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 99.642251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 99.647769] ? copy_mount_options+0x285/0x380 [ 99.652250] ksys_mount+0x12d/0x140 [ 99.655867] SyS_mount+0x35/0x50 [ 99.659220] ? ksys_mount+0x140/0x140 [ 99.663007] do_syscall_64+0x29e/0x9d0 [ 99.666883] ? vmalloc_sync_all+0x30/0x30 [ 99.671019] ? _raw_spin_unlock_irq+0x27/0x70 [ 99.675506] ? finish_task_switch+0x1ca/0x820 [ 99.679989] ? syscall_return_slowpath+0x5c0/0x5c0 [ 99.684907] ? syscall_return_slowpath+0x30f/0x5c0 [ 99.689825] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 99.695176] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 99.700007] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 99.705186] RIP: 0033:0x455279 [ 99.708361] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 99.716056] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 99.723309] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 99.730561] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 99.737814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0h', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c653102", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:30 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653002", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 99.745069] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001d 2018/04/12 00:58:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 1 (fault-call:5 fault-nth:30): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:30 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0z', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:30 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:30 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x0, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:30 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c65318c", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:30 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530e0", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 99.985859] FAULT_INJECTION: forcing a failure. [ 99.985859] name failslab, interval 1, probability 0, space 0, times 0 [ 99.997235] CPU: 0 PID: 9251 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 100.004091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.013455] Call Trace: [ 100.016064] dump_stack+0x1b9/0x294 [ 100.019715] ? dump_stack_print_info.cold.2+0x52/0x52 [ 100.024928] ? __save_stack_trace+0x7e/0xd0 [ 100.029283] should_fail.cold.4+0xa/0x1a 2018/04/12 00:58:30 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 100.033377] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 100.038508] ? save_stack+0x43/0xd0 [ 100.042155] ? kasan_kmalloc+0xc4/0xe0 [ 100.046055] ? kmem_cache_alloc_trace+0x152/0x780 [ 100.050911] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 100.056115] ? __list_lru_init+0x456/0x790 [ 100.060373] ? sget_userns+0x706/0xf20 [ 100.064282] ? graph_lock+0x170/0x170 [ 100.068094] ? do_mount+0x564/0x3070 [ 100.071819] ? ksys_mount+0x12d/0x140 [ 100.075639] ? SyS_mount+0x35/0x50 [ 100.079201] ? do_syscall_64+0x29e/0x9d0 [ 100.083293] ? find_held_lock+0x36/0x1c0 [ 100.087385] ? __lock_is_held+0xb5/0x140 [ 100.091496] ? check_same_owner+0x320/0x320 [ 100.095843] ? rcu_note_context_switch+0x710/0x710 [ 100.100804] __should_failslab+0x124/0x180 [ 100.105063] should_failslab+0x9/0x14 [ 100.108880] kmem_cache_alloc_trace+0x2cb/0x780 [ 100.113565] ? __kmalloc_node+0x33/0x70 [ 100.117553] ? __kmalloc_node+0x33/0x70 [ 100.121552] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.126600] __memcg_init_list_lru_node+0x17d/0x2c0 [ 100.131646] ? kvfree_rcu+0x20/0x20 2018/04/12 00:58:30 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 100.135296] ? __kmalloc_node+0x47/0x70 [ 100.139314] __list_lru_init+0x456/0x790 [ 100.143406] ? list_lru_destroy+0x4c0/0x4c0 [ 100.147743] ? mark_held_locks+0xc9/0x160 [ 100.151911] ? __raw_spin_lock_init+0x1c/0x100 [ 100.156510] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 100.161555] ? lockdep_init_map+0x9/0x10 [ 100.165637] sget_userns+0x706/0xf20 [ 100.169363] ? set_anon_super+0x20/0x20 [ 100.173361] ? get_empty_filp.cold.7+0x3e/0x3e [ 100.177967] ? destroy_unused_super.part.9+0x100/0x100 2018/04/12 00:58:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65308c", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 100.183270] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 100.188311] ? kasan_check_read+0x11/0x20 [ 100.192479] ? rcu_pm_notify+0xc0/0xc0 [ 100.196377] ? trace_hardirqs_off+0xd/0x10 [ 100.200637] ? cap_capable+0x1f9/0x260 [ 100.204553] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.210105] ? security_capable+0x99/0xc0 [ 100.214278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.219831] ? ns_capable_common+0x13f/0x170 [ 100.224263] mount_ns+0x8f/0x1d0 [ 100.227647] ? rpc_pipe_release+0xb70/0xb70 [ 100.231991] rpc_mount+0x9e/0xd0 2018/04/12 00:58:31 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 100.235380] mount_fs+0xae/0x328 [ 100.238778] vfs_kern_mount.part.34+0xd4/0x4d0 [ 100.243385] ? may_umount+0xb0/0xb0 [ 100.247033] ? _raw_read_unlock+0x22/0x30 [ 100.251197] ? __get_fs_type+0x97/0xc0 [ 100.255106] do_mount+0x564/0x3070 [ 100.258661] ? do_raw_spin_unlock+0x9e/0x2e0 [ 100.263090] ? copy_mount_string+0x40/0x40 [ 100.267340] ? rcu_pm_notify+0xc0/0xc0 [ 100.271260] ? copy_mount_options+0x5f/0x380 [ 100.275682] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.280718] ? kmem_cache_alloc_trace+0x616/0x780 [ 100.285582] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 100.291152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.296709] ? copy_mount_options+0x285/0x380 [ 100.301236] ksys_mount+0x12d/0x140 [ 100.304886] SyS_mount+0x35/0x50 [ 100.308267] ? ksys_mount+0x140/0x140 [ 100.312085] do_syscall_64+0x29e/0x9d0 [ 100.315985] ? vmalloc_sync_all+0x30/0x30 [ 100.320148] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.324664] ? finish_task_switch+0x1ca/0x820 [ 100.329179] ? syscall_return_slowpath+0x5c0/0x5c0 [ 100.334127] ? syscall_return_slowpath+0x30f/0x5c0 [ 100.339079] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 100.344468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.349336] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 100.354534] RIP: 0033:0x455279 [ 100.357733] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 100.365462] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 100.372741] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 100.380023] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 100.387303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 100.394587] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001e 2018/04/12 00:58:31 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x0, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:31 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:31 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:31 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:31 executing program 1 (fault-call:5 fault-nth:31): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:31 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\n', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 100.612870] FAULT_INJECTION: forcing a failure. [ 100.612870] name failslab, interval 1, probability 0, space 0, times 0 [ 100.624209] CPU: 0 PID: 9298 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 100.631067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.640444] Call Trace: [ 100.643065] dump_stack+0x1b9/0x294 [ 100.646727] ? dump_stack_print_info.cold.2+0x52/0x52 [ 100.651944] ? __save_stack_trace+0x7e/0xd0 [ 100.656307] should_fail.cold.4+0xa/0x1a [ 100.660413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 100.665544] ? save_stack+0x43/0xd0 [ 100.669194] ? kasan_kmalloc+0xc4/0xe0 [ 100.673080] ? kmem_cache_alloc_trace+0x152/0x780 [ 100.678330] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 100.683522] ? __list_lru_init+0x456/0x790 [ 100.687750] ? sget_userns+0x706/0xf20 [ 100.691633] ? graph_lock+0x170/0x170 [ 100.695421] ? do_mount+0x564/0x3070 [ 100.699124] ? ksys_mount+0x12d/0x140 [ 100.702913] ? SyS_mount+0x35/0x50 [ 100.706446] ? do_syscall_64+0x29e/0x9d0 [ 100.710505] ? find_held_lock+0x36/0x1c0 [ 100.714567] ? __lock_is_held+0xb5/0x140 [ 100.718636] ? check_same_owner+0x320/0x320 [ 100.722952] ? rcu_note_context_switch+0x710/0x710 [ 100.727881] __should_failslab+0x124/0x180 [ 100.732111] should_failslab+0x9/0x14 [ 100.735902] kmem_cache_alloc_trace+0x2cb/0x780 [ 100.740559] ? __kmalloc_node+0x33/0x70 [ 100.744524] ? __kmalloc_node+0x33/0x70 [ 100.748491] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.753509] __memcg_init_list_lru_node+0x17d/0x2c0 [ 100.758522] ? kvfree_rcu+0x20/0x20 [ 100.762141] ? __kmalloc_node+0x47/0x70 [ 100.766115] __list_lru_init+0x456/0x790 [ 100.770174] ? list_lru_destroy+0x4c0/0x4c0 [ 100.774490] ? mark_held_locks+0xc9/0x160 [ 100.778648] ? __raw_spin_lock_init+0x1c/0x100 [ 100.783228] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 100.788242] ? lockdep_init_map+0x9/0x10 [ 100.792300] sget_userns+0x706/0xf20 [ 100.796005] ? set_anon_super+0x20/0x20 [ 100.799991] ? get_empty_filp.cold.7+0x3e/0x3e [ 100.804569] ? destroy_unused_super.part.9+0x100/0x100 [ 100.809842] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 100.814854] ? kasan_check_read+0x11/0x20 [ 100.818996] ? rcu_pm_notify+0xc0/0xc0 [ 100.822879] ? trace_hardirqs_off+0xd/0x10 [ 100.827109] ? cap_capable+0x1f9/0x260 [ 100.830994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.836524] ? security_capable+0x99/0xc0 [ 100.840668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.846197] ? ns_capable_common+0x13f/0x170 [ 100.850601] mount_ns+0x8f/0x1d0 [ 100.853958] ? rpc_pipe_release+0xb70/0xb70 [ 100.858275] rpc_mount+0x9e/0xd0 [ 100.861633] mount_fs+0xae/0x328 [ 100.864997] vfs_kern_mount.part.34+0xd4/0x4d0 [ 100.869579] ? may_umount+0xb0/0xb0 [ 100.873198] ? _raw_read_unlock+0x22/0x30 [ 100.877335] ? __get_fs_type+0x97/0xc0 [ 100.881226] do_mount+0x564/0x3070 [ 100.884764] ? copy_mount_string+0x40/0x40 [ 100.888987] ? rcu_pm_notify+0xc0/0xc0 [ 100.892879] ? copy_mount_options+0x5f/0x380 [ 100.897278] ? rcu_read_lock_sched_held+0x108/0x120 [ 100.902284] ? kmem_cache_alloc_trace+0x616/0x780 [ 100.907120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 100.912646] ? _copy_from_user+0xdf/0x150 [ 100.916788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 100.922314] ? copy_mount_options+0x285/0x380 [ 100.926809] ksys_mount+0x12d/0x140 [ 100.930431] SyS_mount+0x35/0x50 [ 100.933787] ? ksys_mount+0x140/0x140 [ 100.937583] do_syscall_64+0x29e/0x9d0 [ 100.941458] ? vmalloc_sync_all+0x30/0x30 [ 100.945596] ? _raw_spin_unlock_irq+0x27/0x70 [ 100.950081] ? finish_task_switch+0x1ca/0x820 [ 100.954572] ? syscall_return_slowpath+0x5c0/0x5c0 [ 100.959492] ? syscall_return_slowpath+0x30f/0x5c0 [ 100.964416] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 100.969775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 100.974618] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 100.979795] RIP: 0033:0x455279 [ 100.982972] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 100.990678] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 100.997938] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 101.005195] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 101.012452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 101.019708] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000001f 2018/04/12 00:58:31 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0c', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:31 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531ff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:32 executing program 1 (fault-call:5 fault-nth:32): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:32 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x0, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 101.326474] FAULT_INJECTION: forcing a failure. [ 101.326474] name failslab, interval 1, probability 0, space 0, times 0 [ 101.337833] CPU: 0 PID: 9348 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 101.344689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.354058] Call Trace: [ 101.356675] dump_stack+0x1b9/0x294 [ 101.360340] ? dump_stack_print_info.cold.2+0x52/0x52 [ 101.365554] ? __save_stack_trace+0x7e/0xd0 [ 101.369920] should_fail.cold.4+0xa/0x1a [ 101.374009] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 101.379129] ? save_stack+0x43/0xd0 [ 101.382750] ? kasan_kmalloc+0xc4/0xe0 [ 101.386631] ? kmem_cache_alloc_trace+0x152/0x780 [ 101.391473] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 101.396653] ? __list_lru_init+0x456/0x790 [ 101.400877] ? sget_userns+0x706/0xf20 [ 101.404759] ? graph_lock+0x170/0x170 [ 101.408546] ? do_mount+0x564/0x3070 [ 101.412250] ? ksys_mount+0x12d/0x140 [ 101.416048] ? SyS_mount+0x35/0x50 [ 101.419580] ? do_syscall_64+0x29e/0x9d0 [ 101.423642] ? find_held_lock+0x36/0x1c0 [ 101.427701] ? __lock_is_held+0xb5/0x140 [ 101.431769] ? check_same_owner+0x320/0x320 [ 101.436088] ? rcu_note_context_switch+0x710/0x710 [ 101.441024] __should_failslab+0x124/0x180 [ 101.445259] should_failslab+0x9/0x14 [ 101.449055] kmem_cache_alloc_trace+0x2cb/0x780 [ 101.453713] ? __kmalloc_node+0x33/0x70 [ 101.457676] ? __kmalloc_node+0x33/0x70 [ 101.461640] ? rcu_read_lock_sched_held+0x108/0x120 [ 101.466655] __memcg_init_list_lru_node+0x17d/0x2c0 [ 101.471666] ? kvfree_rcu+0x20/0x20 [ 101.475283] ? __kmalloc_node+0x47/0x70 [ 101.479262] __list_lru_init+0x456/0x790 [ 101.483326] ? list_lru_destroy+0x4c0/0x4c0 [ 101.487636] ? mark_held_locks+0xc9/0x160 [ 101.491780] ? __raw_spin_lock_init+0x1c/0x100 [ 101.496353] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 101.501367] ? lockdep_init_map+0x9/0x10 [ 101.505424] sget_userns+0x706/0xf20 [ 101.509126] ? set_anon_super+0x20/0x20 [ 101.513106] ? get_empty_filp.cold.7+0x3e/0x3e [ 101.517680] ? destroy_unused_super.part.9+0x100/0x100 [ 101.522953] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 101.527962] ? kasan_check_read+0x11/0x20 [ 101.532107] ? rcu_pm_notify+0xc0/0xc0 [ 101.535984] ? trace_hardirqs_off+0xd/0x10 [ 101.540218] ? cap_capable+0x1f9/0x260 [ 101.544106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.549631] ? security_capable+0x99/0xc0 [ 101.553774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.559302] ? ns_capable_common+0x13f/0x170 [ 101.563708] mount_ns+0x8f/0x1d0 [ 101.567069] ? rpc_pipe_release+0xb70/0xb70 [ 101.571384] rpc_mount+0x9e/0xd0 [ 101.574766] mount_fs+0xae/0x328 [ 101.578131] vfs_kern_mount.part.34+0xd4/0x4d0 [ 101.582708] ? may_umount+0xb0/0xb0 [ 101.586324] ? _raw_read_unlock+0x22/0x30 [ 101.590462] ? __get_fs_type+0x97/0xc0 [ 101.594349] do_mount+0x564/0x3070 [ 101.597885] ? copy_mount_string+0x40/0x40 [ 101.602108] ? rcu_pm_notify+0xc0/0xc0 [ 101.605995] ? copy_mount_options+0x5f/0x380 [ 101.610410] ? rcu_read_lock_sched_held+0x108/0x120 [ 101.615508] ? kmem_cache_alloc_trace+0x616/0x780 [ 101.620347] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 101.625874] ? _copy_from_user+0xdf/0x150 [ 101.630023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 101.635567] ? copy_mount_options+0x285/0x380 [ 101.640061] ksys_mount+0x12d/0x140 [ 101.643685] SyS_mount+0x35/0x50 [ 101.647043] ? ksys_mount+0x140/0x140 [ 101.650841] do_syscall_64+0x29e/0x9d0 [ 101.654716] ? vmalloc_sync_all+0x30/0x30 [ 101.658852] ? _raw_spin_unlock_irq+0x27/0x70 [ 101.663339] ? finish_task_switch+0x1ca/0x820 [ 101.667825] ? syscall_return_slowpath+0x5c0/0x5c0 [ 101.672747] ? syscall_return_slowpath+0x30f/0x5c0 [ 101.677673] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 101.683044] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 101.687885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 101.693062] RIP: 0033:0x455279 [ 101.696238] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 101.703943] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 101.711203] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 101.718459] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 101.725725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 101.732980] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000020 2018/04/12 00:58:32 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:32 executing program 1 (fault-call:5 fault-nth:33): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:32 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x0, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:32 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653081", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:32 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 101.956405] FAULT_INJECTION: forcing a failure. [ 101.956405] name failslab, interval 1, probability 0, space 0, times 0 [ 101.967771] CPU: 1 PID: 9374 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 101.974616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.983972] Call Trace: [ 101.986577] dump_stack+0x1b9/0x294 [ 101.990220] ? dump_stack_print_info.cold.2+0x52/0x52 [ 101.995421] ? perf_trace_lock_acquire+0xe3/0x980 [ 102.000275] ? __save_stack_trace+0x7e/0xd0 [ 102.004616] should_fail.cold.4+0xa/0x1a [ 102.008696] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 102.013807] ? save_stack+0x43/0xd0 [ 102.017440] ? kasan_kmalloc+0xc4/0xe0 [ 102.021327] ? kmem_cache_alloc_trace+0x152/0x780 [ 102.026164] ? __memcg_init_list_lru_node+0x17d/0x2c0 [ 102.031342] ? __list_lru_init+0x456/0x790 [ 102.035565] ? sget_userns+0x706/0xf20 [ 102.039442] ? graph_lock+0x170/0x170 [ 102.043227] ? do_mount+0x564/0x3070 [ 102.046926] ? ksys_mount+0x12d/0x140 [ 102.050710] ? SyS_mount+0x35/0x50 [ 102.054237] ? do_syscall_64+0x29e/0x9d0 [ 102.058287] ? find_held_lock+0x36/0x1c0 [ 102.062336] ? __lock_is_held+0xb5/0x140 [ 102.066391] ? check_same_owner+0x320/0x320 [ 102.070700] ? rcu_note_context_switch+0x710/0x710 [ 102.075622] __should_failslab+0x124/0x180 [ 102.079846] should_failslab+0x9/0x14 [ 102.083631] kmem_cache_alloc_trace+0x2cb/0x780 [ 102.088282] ? __kmalloc_node+0x33/0x70 [ 102.092239] ? __kmalloc_node+0x33/0x70 [ 102.096198] ? rcu_read_lock_sched_held+0x108/0x120 [ 102.101207] __memcg_init_list_lru_node+0x17d/0x2c0 [ 102.106210] ? kvfree_rcu+0x20/0x20 [ 102.109825] ? __kmalloc_node+0x47/0x70 [ 102.113792] __list_lru_init+0x456/0x790 [ 102.117842] ? list_lru_destroy+0x4c0/0x4c0 [ 102.122148] ? mark_held_locks+0xc9/0x160 [ 102.126282] ? __raw_spin_lock_init+0x1c/0x100 [ 102.130849] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 102.135855] ? lockdep_init_map+0x9/0x10 [ 102.139906] sget_userns+0x706/0xf20 [ 102.143609] ? set_anon_super+0x20/0x20 [ 102.147572] ? get_empty_filp.cold.7+0x3e/0x3e [ 102.152146] ? destroy_unused_super.part.9+0x100/0x100 [ 102.157410] ? __alloc_pages_slowpath+0x2dc0/0x2dc0 [ 102.162411] ? kasan_check_read+0x11/0x20 [ 102.166547] ? rcu_pm_notify+0xc0/0xc0 [ 102.170418] ? trace_hardirqs_off+0xd/0x10 [ 102.174638] ? cap_capable+0x1f9/0x260 [ 102.178520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.184049] ? security_capable+0x99/0xc0 [ 102.188191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.193711] ? ns_capable_common+0x13f/0x170 [ 102.198114] mount_ns+0x8f/0x1d0 [ 102.201465] ? rpc_pipe_release+0xb70/0xb70 [ 102.205773] rpc_mount+0x9e/0xd0 [ 102.209126] mount_fs+0xae/0x328 [ 102.212484] vfs_kern_mount.part.34+0xd4/0x4d0 [ 102.217056] ? may_umount+0xb0/0xb0 [ 102.220667] ? _raw_read_unlock+0x22/0x30 [ 102.224800] ? __get_fs_type+0x97/0xc0 [ 102.228674] do_mount+0x564/0x3070 [ 102.232201] ? do_raw_spin_unlock+0x9e/0x2e0 [ 102.236599] ? copy_mount_string+0x40/0x40 [ 102.240819] ? rcu_pm_notify+0xc0/0xc0 [ 102.244694] ? copy_mount_options+0x5f/0x380 [ 102.249086] ? rcu_read_lock_sched_held+0x108/0x120 [ 102.254087] ? kmem_cache_alloc_trace+0x616/0x780 [ 102.258919] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.264446] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.269965] ? copy_mount_options+0x285/0x380 [ 102.274450] ksys_mount+0x12d/0x140 [ 102.278067] SyS_mount+0x35/0x50 [ 102.281420] ? ksys_mount+0x140/0x140 [ 102.285210] do_syscall_64+0x29e/0x9d0 [ 102.289082] ? vmalloc_sync_all+0x30/0x30 [ 102.293218] ? finish_task_switch+0x1ca/0x820 [ 102.297700] ? syscall_return_slowpath+0x5c0/0x5c0 [ 102.302616] ? syscall_return_slowpath+0x30f/0x5c0 [ 102.307534] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 102.312884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 102.317716] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 102.322894] RIP: 0033:0x455279 [ 102.326070] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 102.333762] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 102.341020] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 102.348279] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/12 00:58:32 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\a', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 102.355533] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 102.362787] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000021 2018/04/12 00:58:33 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 1 (fault-call:5 fault-nth:34): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x0, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 102.618438] FAULT_INJECTION: forcing a failure. [ 102.618438] name failslab, interval 1, probability 0, space 0, times 0 [ 102.629973] CPU: 0 PID: 9409 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 102.636833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.646205] Call Trace: [ 102.648821] dump_stack+0x1b9/0x294 [ 102.652486] ? dump_stack_print_info.cold.2+0x52/0x52 [ 102.657703] ? perf_trace_run_bpf_submit+0x23f/0x370 [ 102.662848] should_fail.cold.4+0xa/0x1a [ 102.666946] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 102.672084] ? __save_stack_trace+0x7e/0xd0 [ 102.676433] ? graph_lock+0x170/0x170 [ 102.680691] ? find_held_lock+0x36/0x1c0 [ 102.684826] ? __lock_is_held+0xb5/0x140 [ 102.688930] ? check_same_owner+0x320/0x320 [ 102.693281] ? rcu_note_context_switch+0x710/0x710 [ 102.698242] __should_failslab+0x124/0x180 [ 102.702500] should_failslab+0x9/0x14 [ 102.706323] kmem_cache_alloc+0x2af/0x760 [ 102.710500] ? lock_downgrade+0x8e0/0x8e0 [ 102.714673] __d_alloc+0xc1/0xc00 [ 102.718156] ? shrink_dcache_for_umount+0x290/0x290 [ 102.723193] ? mark_held_locks+0xc9/0x160 [ 102.727368] ? current_kernel_time64+0x242/0x2f0 [ 102.732148] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 102.737198] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 102.742225] ? current_kernel_time64+0x1f4/0x2f0 [ 102.746979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.752508] ? timespec_trunc+0xe7/0x170 [ 102.756559] ? put_itimerspec64+0x310/0x310 [ 102.760868] ? evict_inodes+0x5f0/0x5f0 [ 102.764834] ? rcu_is_watching+0x85/0x140 [ 102.768984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.774522] d_make_root+0x42/0x90 [ 102.778057] rpc_fill_super+0x37f/0xbb0 [ 102.782035] ? cap_capable+0x1f9/0x260 [ 102.785917] ? rpc_pipe_release+0xb70/0xb70 [ 102.790240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.795767] ? security_capable+0x99/0xc0 [ 102.799907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.805437] ? ns_capable_common+0x13f/0x170 [ 102.809841] mount_ns+0x12a/0x1d0 [ 102.813283] ? rpc_pipe_release+0xb70/0xb70 [ 102.817597] rpc_mount+0x9e/0xd0 [ 102.820960] mount_fs+0xae/0x328 [ 102.824327] vfs_kern_mount.part.34+0xd4/0x4d0 [ 102.828903] ? may_umount+0xb0/0xb0 [ 102.832526] ? _raw_read_unlock+0x22/0x30 [ 102.836663] ? __get_fs_type+0x97/0xc0 [ 102.840548] do_mount+0x564/0x3070 [ 102.844086] ? copy_mount_string+0x40/0x40 [ 102.848309] ? rcu_pm_notify+0xc0/0xc0 [ 102.852200] ? copy_mount_options+0x5f/0x380 [ 102.856596] ? rcu_read_lock_sched_held+0x108/0x120 [ 102.861602] ? kmem_cache_alloc_trace+0x616/0x780 [ 102.866439] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 102.871969] ? _copy_from_user+0xdf/0x150 [ 102.876115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 102.881642] ? copy_mount_options+0x285/0x380 [ 102.886134] ksys_mount+0x12d/0x140 [ 102.889754] SyS_mount+0x35/0x50 [ 102.893111] ? ksys_mount+0x140/0x140 [ 102.896904] do_syscall_64+0x29e/0x9d0 [ 102.900779] ? vmalloc_sync_all+0x30/0x30 [ 102.904913] ? _raw_spin_unlock_irq+0x27/0x70 [ 102.909402] ? finish_task_switch+0x1ca/0x820 [ 102.913888] ? syscall_return_slowpath+0x5c0/0x5c0 [ 102.918809] ? syscall_return_slowpath+0x30f/0x5c0 [ 102.923732] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 102.929094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 102.933936] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 102.939114] RIP: 0033:0x455279 [ 102.942289] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 102.949992] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 102.957253] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/12 00:58:33 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531ff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530fe", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 102.964513] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 102.971769] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 102.979033] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000022 2018/04/12 00:58:33 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x0, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:33 executing program 1 (fault-call:5 fault-nth:35): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0H', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\t', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:33 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:33 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 103.207923] FAULT_INJECTION: forcing a failure. [ 103.207923] name failslab, interval 1, probability 0, space 0, times 0 [ 103.219409] CPU: 1 PID: 9449 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 103.226253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.235610] Call Trace: [ 103.238208] dump_stack+0x1b9/0x294 [ 103.241849] ? dump_stack_print_info.cold.2+0x52/0x52 [ 103.247050] ? perf_trace_lock_acquire+0xe3/0x980 [ 103.251914] should_fail.cold.4+0xa/0x1a [ 103.255997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 103.261120] ? graph_lock+0x170/0x170 [ 103.264941] ? find_held_lock+0x36/0x1c0 [ 103.269021] ? __lock_is_held+0xb5/0x140 [ 103.273115] ? check_same_owner+0x320/0x320 [ 103.277454] ? rcu_note_context_switch+0x710/0x710 [ 103.282381] ? lock_downgrade+0x8e0/0x8e0 [ 103.286525] __should_failslab+0x124/0x180 [ 103.290752] should_failslab+0x9/0x14 [ 103.294542] kmem_cache_alloc+0x2af/0x760 [ 103.298685] __d_alloc+0xc1/0xc00 [ 103.302132] ? shrink_dcache_for_umount+0x290/0x290 [ 103.307139] ? d_alloc_parallel+0x1e80/0x1e80 [ 103.311624] ? lock_release+0xa10/0xa10 [ 103.315586] ? mark_held_locks+0xc9/0x160 [ 103.319718] ? d_lookup+0x254/0x330 [ 103.323352] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 103.328352] ? d_lookup+0x219/0x330 [ 103.331964] d_alloc+0x8e/0x370 [ 103.335232] ? __d_alloc+0xc00/0xc00 [ 103.338931] ? full_name_hash+0xc0/0x100 [ 103.342984] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 103.348246] ? down_write+0x87/0x120 [ 103.351944] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 103.356163] ? down_read+0x1b0/0x1b0 [ 103.359863] ? kasan_check_write+0x14/0x20 [ 103.364085] rpc_populate.constprop.16+0x99/0x390 [ 103.368921] rpc_fill_super+0x3c9/0xbb0 [ 103.372883] ? cap_capable+0x1f9/0x260 [ 103.376760] ? rpc_pipe_release+0xb70/0xb70 [ 103.381068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.386589] ? security_capable+0x99/0xc0 [ 103.390724] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.396247] ? ns_capable_common+0x13f/0x170 [ 103.400648] mount_ns+0x12a/0x1d0 [ 103.404095] ? rpc_pipe_release+0xb70/0xb70 [ 103.408403] rpc_mount+0x9e/0xd0 [ 103.411755] mount_fs+0xae/0x328 [ 103.415112] vfs_kern_mount.part.34+0xd4/0x4d0 [ 103.419682] ? may_umount+0xb0/0xb0 [ 103.423295] ? _raw_read_unlock+0x22/0x30 [ 103.427427] ? __get_fs_type+0x97/0xc0 [ 103.431302] do_mount+0x564/0x3070 [ 103.434830] ? copy_mount_string+0x40/0x40 [ 103.439052] ? rcu_pm_notify+0xc0/0xc0 [ 103.442929] ? copy_mount_options+0x5f/0x380 [ 103.447321] ? rcu_read_lock_sched_held+0x108/0x120 [ 103.452326] ? kmem_cache_alloc_trace+0x616/0x780 [ 103.457159] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 103.462680] ? _copy_from_user+0xdf/0x150 [ 103.466816] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 103.472335] ? copy_mount_options+0x285/0x380 [ 103.476818] ksys_mount+0x12d/0x140 [ 103.480433] SyS_mount+0x35/0x50 [ 103.483784] ? ksys_mount+0x140/0x140 [ 103.487572] do_syscall_64+0x29e/0x9d0 [ 103.491444] ? vmalloc_sync_all+0x30/0x30 [ 103.495575] ? _raw_spin_unlock_irq+0x27/0x70 [ 103.500056] ? finish_task_switch+0x1ca/0x820 [ 103.504539] ? syscall_return_slowpath+0x5c0/0x5c0 [ 103.509455] ? syscall_return_slowpath+0x30f/0x5c0 [ 103.514791] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 103.520146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 103.524977] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 103.530152] RIP: 0033:0x455279 [ 103.533323] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 103.541021] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 103.548281] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 2018/04/12 00:58:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 103.555532] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 103.562878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 103.570133] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000023 [ 103.578368] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x0, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:34 executing program 1 (fault-call:5 fault-nth:36): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 103.884250] FAULT_INJECTION: forcing a failure. [ 103.884250] name failslab, interval 1, probability 0, space 0, times 0 [ 103.895574] CPU: 1 PID: 9499 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 103.902423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.911775] Call Trace: [ 103.914369] dump_stack+0x1b9/0x294 [ 103.918015] ? dump_stack_print_info.cold.2+0x52/0x52 [ 103.923212] ? perf_trace_lock_acquire+0xe3/0x980 [ 103.928072] should_fail.cold.4+0xa/0x1a [ 103.932151] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 103.937266] ? __save_stack_trace+0x7e/0xd0 [ 103.941600] ? graph_lock+0x170/0x170 [ 103.945413] ? __raw_spin_lock_init+0x1c/0x100 [ 103.950009] ? find_held_lock+0x36/0x1c0 [ 103.954084] ? __lock_is_held+0xb5/0x140 [ 103.958169] ? check_same_owner+0x320/0x320 [ 103.962502] ? rcu_note_context_switch+0x710/0x710 [ 103.967449] __should_failslab+0x124/0x180 [ 103.971693] should_failslab+0x9/0x14 [ 103.975503] kmem_cache_alloc+0x2af/0x760 [ 103.979668] ? lock_downgrade+0x8e0/0x8e0 [ 103.983824] __d_alloc+0xc1/0xc00 [ 103.987292] ? shrink_dcache_for_umount+0x290/0x290 [ 103.992317] ? mark_held_locks+0xc9/0x160 [ 103.996476] ? current_kernel_time64+0x242/0x2f0 [ 104.001238] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 104.006264] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 104.011292] ? current_kernel_time64+0x1f4/0x2f0 [ 104.016063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.021617] ? timespec_trunc+0xe7/0x170 [ 104.025688] ? put_itimerspec64+0x310/0x310 [ 104.030014] ? evict_inodes+0x5f0/0x5f0 2018/04/12 00:58:34 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:34 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 104.033996] ? rcu_is_watching+0x85/0x140 [ 104.038161] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.043708] d_make_root+0x42/0x90 [ 104.047258] rpc_fill_super+0x37f/0xbb0 [ 104.051246] ? cap_capable+0x1f9/0x260 [ 104.055159] ? rpc_pipe_release+0xb70/0xb70 [ 104.059498] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.065038] ? security_capable+0x99/0xc0 [ 104.069200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.074741] ? ns_capable_common+0x13f/0x170 [ 104.079163] mount_ns+0x12a/0x1d0 [ 104.082620] ? rpc_pipe_release+0xb70/0xb70 [ 104.086949] rpc_mount+0x9e/0xd0 [ 104.090323] mount_fs+0xae/0x328 [ 104.093704] vfs_kern_mount.part.34+0xd4/0x4d0 [ 104.098301] ? may_umount+0xb0/0xb0 [ 104.101932] ? _raw_read_unlock+0x22/0x30 [ 104.106087] ? __get_fs_type+0x97/0xc0 [ 104.109982] do_mount+0x564/0x3070 [ 104.113527] ? do_raw_spin_unlock+0x9e/0x2e0 [ 104.117952] ? copy_mount_string+0x40/0x40 [ 104.122191] ? rcu_pm_notify+0xc0/0xc0 [ 104.126089] ? copy_mount_options+0x5f/0x380 [ 104.130505] ? rcu_read_lock_sched_held+0x108/0x120 2018/04/12 00:58:34 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:34 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 104.135528] ? kmem_cache_alloc_trace+0x616/0x780 [ 104.140382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 104.145935] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.151475] ? copy_mount_options+0x285/0x380 [ 104.155977] ksys_mount+0x12d/0x140 [ 104.159605] SyS_mount+0x35/0x50 [ 104.162970] ? ksys_mount+0x140/0x140 [ 104.166780] do_syscall_64+0x29e/0x9d0 [ 104.170672] ? vmalloc_sync_all+0x30/0x30 [ 104.174824] ? _raw_spin_unlock_irq+0x27/0x70 [ 104.179326] ? finish_task_switch+0x1ca/0x820 [ 104.183832] ? syscall_return_slowpath+0x5c0/0x5c0 [ 104.188860] ? syscall_return_slowpath+0x30f/0x5c0 [ 104.193799] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 104.199173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 104.204028] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 104.209221] RIP: 0033:0x455279 [ 104.212409] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 104.220125] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 104.227400] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 104.234672] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 104.241946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 104.249216] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000024 2018/04/12 00:58:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530c0", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:35 executing program 1 (fault-call:5 fault-nth:37): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:35 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:35 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0H', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 104.590935] FAULT_INJECTION: forcing a failure. [ 104.590935] name failslab, interval 1, probability 0, space 0, times 0 [ 104.602278] CPU: 0 PID: 9554 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 104.609139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.618505] Call Trace: [ 104.621112] dump_stack+0x1b9/0x294 [ 104.624763] ? dump_stack_print_info.cold.2+0x52/0x52 [ 104.629994] should_fail.cold.4+0xa/0x1a [ 104.634088] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 104.639223] ? graph_lock+0x170/0x170 [ 104.643062] ? find_held_lock+0x36/0x1c0 [ 104.647139] ? __lock_is_held+0xb5/0x140 [ 104.651217] ? check_same_owner+0x320/0x320 [ 104.655539] ? rcu_note_context_switch+0x710/0x710 [ 104.660458] ? lock_downgrade+0x8e0/0x8e0 [ 104.664607] __should_failslab+0x124/0x180 [ 104.668835] should_failslab+0x9/0x14 [ 104.672626] kmem_cache_alloc+0x2af/0x760 [ 104.676775] __d_alloc+0xc1/0xc00 [ 104.680548] ? shrink_dcache_for_umount+0x290/0x290 [ 104.685563] ? d_alloc_parallel+0x1e80/0x1e80 [ 104.690061] ? lock_release+0xa10/0xa10 [ 104.694045] ? mark_held_locks+0xc9/0x160 [ 104.698188] ? d_lookup+0x254/0x330 [ 104.701813] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 104.706816] ? d_lookup+0x219/0x330 [ 104.710436] d_alloc+0x8e/0x370 [ 104.713709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.719234] ? __d_alloc+0xc00/0xc00 [ 104.722941] ? full_name_hash+0xc0/0x100 [ 104.727011] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 104.732294] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 104.736534] rpc_populate.constprop.16+0x99/0x390 [ 104.741551] rpc_fill_super+0x3c9/0xbb0 [ 104.745518] ? cap_capable+0x1f9/0x260 [ 104.749396] ? rpc_pipe_release+0xb70/0xb70 [ 104.753714] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.759238] ? security_capable+0x99/0xc0 [ 104.763384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.768911] ? ns_capable_common+0x13f/0x170 [ 104.773313] mount_ns+0x12a/0x1d0 [ 104.776756] ? rpc_pipe_release+0xb70/0xb70 [ 104.781073] rpc_mount+0x9e/0xd0 [ 104.784433] mount_fs+0xae/0x328 [ 104.787801] vfs_kern_mount.part.34+0xd4/0x4d0 [ 104.792375] ? may_umount+0xb0/0xb0 [ 104.795993] ? _raw_read_unlock+0x22/0x30 [ 104.800138] ? __get_fs_type+0x97/0xc0 [ 104.804035] do_mount+0x564/0x3070 [ 104.807579] ? copy_mount_string+0x40/0x40 [ 104.811805] ? rcu_pm_notify+0xc0/0xc0 [ 104.815693] ? copy_mount_options+0x5f/0x380 [ 104.820091] ? rcu_read_lock_sched_held+0x108/0x120 [ 104.825097] ? kmem_cache_alloc_trace+0x616/0x780 [ 104.829942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 104.835466] ? copy_mount_options+0x285/0x380 [ 104.839957] ksys_mount+0x12d/0x140 [ 104.843577] SyS_mount+0x35/0x50 [ 104.846931] ? ksys_mount+0x140/0x140 [ 104.850727] do_syscall_64+0x29e/0x9d0 [ 104.854603] ? vmalloc_sync_all+0x30/0x30 [ 104.858738] ? _raw_spin_unlock_irq+0x27/0x70 [ 104.863228] ? finish_task_switch+0x1ca/0x820 [ 104.867717] ? syscall_return_slowpath+0x5c0/0x5c0 [ 104.872637] ? syscall_return_slowpath+0x30f/0x5c0 [ 104.877561] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 104.882923] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/12 00:58:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653092", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 104.887764] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 104.892940] RIP: 0033:0x455279 [ 104.896118] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 104.903819] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 104.911085] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 104.918341] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 104.925597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 104.932857] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000025 2018/04/12 00:58:35 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0x0, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:35 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:35 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 105.244397] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:36 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0x0, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0x0, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:36 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 1 (fault-call:5 fault-nth:38): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 105.388463] FAULT_INJECTION: forcing a failure. [ 105.388463] name failslab, interval 1, probability 0, space 0, times 0 [ 105.399794] CPU: 1 PID: 9616 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 105.406645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.416006] Call Trace: [ 105.418610] dump_stack+0x1b9/0x294 [ 105.422263] ? dump_stack_print_info.cold.2+0x52/0x52 [ 105.427473] ? perf_trace_lock_acquire+0xe3/0x980 [ 105.432340] should_fail.cold.4+0xa/0x1a [ 105.436418] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 105.441536] ? graph_lock+0x170/0x170 [ 105.445351] ? find_held_lock+0x36/0x1c0 [ 105.449424] ? __lock_is_held+0xb5/0x140 [ 105.453511] ? check_same_owner+0x320/0x320 [ 105.457852] ? rcu_note_context_switch+0x710/0x710 [ 105.462790] ? lock_downgrade+0x8e0/0x8e0 [ 105.466956] __should_failslab+0x124/0x180 [ 105.471186] should_failslab+0x9/0x14 [ 105.474976] kmem_cache_alloc+0x2af/0x760 [ 105.479120] __d_alloc+0xc1/0xc00 [ 105.482565] ? shrink_dcache_for_umount+0x290/0x290 [ 105.487572] ? d_alloc_parallel+0x1e80/0x1e80 [ 105.492054] ? lock_release+0xa10/0xa10 [ 105.496022] ? mark_held_locks+0xc9/0x160 [ 105.500159] ? d_lookup+0x254/0x330 [ 105.503777] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 105.508780] ? d_lookup+0x219/0x330 [ 105.512797] d_alloc+0x8e/0x370 [ 105.516065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.521587] ? __d_alloc+0xc00/0xc00 [ 105.525285] ? full_name_hash+0xc0/0x100 [ 105.529338] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 105.534598] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 105.538824] rpc_populate.constprop.16+0x99/0x390 [ 105.543657] rpc_fill_super+0x3c9/0xbb0 [ 105.547618] ? cap_capable+0x1f9/0x260 [ 105.551493] ? rpc_pipe_release+0xb70/0xb70 [ 105.555803] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.561326] ? security_capable+0x99/0xc0 [ 105.565464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.570986] ? ns_capable_common+0x13f/0x170 [ 105.575384] mount_ns+0x12a/0x1d0 [ 105.578825] ? rpc_pipe_release+0xb70/0xb70 [ 105.583133] rpc_mount+0x9e/0xd0 [ 105.586485] mount_fs+0xae/0x328 [ 105.589843] vfs_kern_mount.part.34+0xd4/0x4d0 [ 105.594412] ? may_umount+0xb0/0xb0 [ 105.598027] ? _raw_read_unlock+0x22/0x30 [ 105.602165] ? __get_fs_type+0x97/0xc0 [ 105.606044] do_mount+0x564/0x3070 [ 105.609578] ? copy_mount_string+0x40/0x40 [ 105.613799] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 105.618833] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 105.623579] ? retint_kernel+0x10/0x10 [ 105.627457] ? copy_mount_options+0x1f0/0x380 [ 105.631937] ? copy_mount_options+0x202/0x380 [ 105.636422] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 105.641946] ? copy_mount_options+0x285/0x380 [ 105.646427] ksys_mount+0x12d/0x140 [ 105.650045] SyS_mount+0x35/0x50 [ 105.653394] ? ksys_mount+0x140/0x140 [ 105.657180] do_syscall_64+0x29e/0x9d0 [ 105.661051] ? vmalloc_sync_all+0x30/0x30 [ 105.665181] ? _raw_spin_unlock_irq+0x27/0x70 [ 105.669664] ? finish_task_switch+0x1ca/0x820 [ 105.674144] ? syscall_return_slowpath+0x5c0/0x5c0 [ 105.679059] ? syscall_return_slowpath+0x30f/0x5c0 [ 105.683975] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 105.689326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 105.694166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 105.699336] RIP: 0033:0x455279 [ 105.702509] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 105.710201] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 105.717456] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 105.724711] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 105.731965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 105.739220] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000026 [ 105.769087] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0x0, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 1 (fault-call:5 fault-nth:39): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0x0, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:36 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0x0, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:36 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c65308f", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:36 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 106.152988] FAULT_INJECTION: forcing a failure. [ 106.152988] name failslab, interval 1, probability 0, space 0, times 0 [ 106.164321] CPU: 0 PID: 9671 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 106.171177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.180546] Call Trace: [ 106.183156] dump_stack+0x1b9/0x294 [ 106.186816] ? dump_stack_print_info.cold.2+0x52/0x52 [ 106.192054] should_fail.cold.4+0xa/0x1a [ 106.196147] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 106.201281] ? graph_lock+0x170/0x170 [ 106.205112] ? find_held_lock+0x36/0x1c0 [ 106.209201] ? __lock_is_held+0xb5/0x140 [ 106.213310] ? check_same_owner+0x320/0x320 [ 106.217658] ? rcu_note_context_switch+0x710/0x710 [ 106.222606] ? lock_downgrade+0x8e0/0x8e0 [ 106.226791] __should_failslab+0x124/0x180 [ 106.231047] should_failslab+0x9/0x14 [ 106.234862] kmem_cache_alloc+0x2af/0x760 [ 106.239049] __d_alloc+0xc1/0xc00 [ 106.242531] ? shrink_dcache_for_umount+0x290/0x290 [ 106.247571] ? d_alloc_parallel+0x1e80/0x1e80 [ 106.252095] ? lock_release+0xa10/0xa10 [ 106.256092] ? mark_held_locks+0xc9/0x160 [ 106.260262] ? d_lookup+0x254/0x330 [ 106.263920] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 106.268950] ? d_lookup+0x219/0x330 [ 106.272597] d_alloc+0x8e/0x370 [ 106.275903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.281458] ? __d_alloc+0xc00/0xc00 [ 106.285188] ? full_name_hash+0xc0/0x100 [ 106.289288] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 106.294588] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 106.298869] rpc_populate.constprop.16+0x99/0x390 2018/04/12 00:58:36 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x0, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 106.303751] rpc_fill_super+0x3c9/0xbb0 [ 106.307751] ? cap_capable+0x1f9/0x260 [ 106.311656] ? rpc_pipe_release+0xb70/0xb70 [ 106.316002] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.321551] ? security_capable+0x99/0xc0 [ 106.325730] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.331285] ? ns_capable_common+0x13f/0x170 [ 106.335713] mount_ns+0x12a/0x1d0 [ 106.339163] ? rpc_pipe_release+0xb70/0xb70 [ 106.343484] rpc_mount+0x9e/0xd0 [ 106.346849] mount_fs+0xae/0x328 [ 106.350217] vfs_kern_mount.part.34+0xd4/0x4d0 [ 106.354800] ? may_umount+0xb0/0xb0 [ 106.358418] ? _raw_read_unlock+0x22/0x30 [ 106.362556] ? __get_fs_type+0x97/0xc0 [ 106.366441] do_mount+0x564/0x3070 [ 106.369980] ? copy_mount_string+0x40/0x40 [ 106.374213] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 106.378967] ? retint_kernel+0x10/0x10 [ 106.382854] ? copy_mount_options+0x1a1/0x380 [ 106.387341] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 106.392176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.397707] ? copy_mount_options+0x285/0x380 [ 106.402205] ksys_mount+0x12d/0x140 [ 106.405825] SyS_mount+0x35/0x50 [ 106.409182] ? ksys_mount+0x140/0x140 [ 106.412980] do_syscall_64+0x29e/0x9d0 [ 106.416860] ? vmalloc_sync_all+0x30/0x30 [ 106.421001] ? _raw_spin_unlock_irq+0x27/0x70 [ 106.425495] ? finish_task_switch+0x1ca/0x820 [ 106.429986] ? syscall_return_slowpath+0x5c0/0x5c0 [ 106.434915] ? syscall_return_slowpath+0x30f/0x5c0 [ 106.439839] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 106.445201] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 106.450056] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 106.455240] RIP: 0033:0x455279 [ 106.458417] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 106.466125] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 106.473390] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 106.480651] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 106.487908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 106.495167] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000027 2018/04/12 00:58:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0l', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531ff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:37 executing program 1 (fault-call:5 fault-nth:40): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 106.505845] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:37 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x0, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 106.641730] FAULT_INJECTION: forcing a failure. [ 106.641730] name failslab, interval 1, probability 0, space 0, times 0 [ 106.653110] CPU: 1 PID: 9711 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 106.659958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.669313] Call Trace: [ 106.671915] dump_stack+0x1b9/0x294 [ 106.675556] ? dump_stack_print_info.cold.2+0x52/0x52 [ 106.680756] ? perf_trace_lock_acquire+0xe3/0x980 [ 106.685604] ? graph_lock+0x170/0x170 [ 106.689428] should_fail.cold.4+0xa/0x1a [ 106.693504] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 106.698619] ? perf_trace_lock+0x900/0x900 [ 106.702864] ? graph_lock+0x170/0x170 [ 106.706671] ? graph_lock+0x170/0x170 [ 106.710481] ? find_held_lock+0x36/0x1c0 [ 106.714559] ? __lock_is_held+0xb5/0x140 [ 106.718642] ? check_same_owner+0x320/0x320 [ 106.722981] ? rcu_note_context_switch+0x710/0x710 [ 106.727925] __should_failslab+0x124/0x180 [ 106.732171] should_failslab+0x9/0x14 [ 106.735979] kmem_cache_alloc+0x2af/0x760 [ 106.740143] ? rpc_i_callback+0x30/0x30 [ 106.744129] rpc_alloc_inode+0x1a/0x20 [ 106.748023] alloc_inode+0x63/0x190 [ 106.751662] new_inode_pseudo+0x69/0x1a0 [ 106.755727] ? prune_icache_sb+0x1a0/0x1a0 [ 106.759970] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 106.764567] ? kasan_check_write+0x14/0x20 [ 106.768811] ? do_raw_spin_lock+0xc1/0x200 [ 106.773060] new_inode+0x1c/0x40 [ 106.776435] rpc_get_inode+0x1e/0x1f0 [ 106.780245] ? d_drop+0x5a/0x70 [ 106.783538] __rpc_create_common+0x5d/0x190 [ 106.787873] rpc_populate.constprop.16+0x11f/0x390 [ 106.792820] rpc_fill_super+0x3c9/0xbb0 [ 106.796803] ? cap_capable+0x1f9/0x260 [ 106.800702] ? rpc_pipe_release+0xb70/0xb70 [ 106.805037] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.810583] ? security_capable+0x99/0xc0 [ 106.814742] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.820286] ? ns_capable_common+0x13f/0x170 [ 106.824706] mount_ns+0x12a/0x1d0 [ 106.828167] ? rpc_pipe_release+0xb70/0xb70 [ 106.832499] rpc_mount+0x9e/0xd0 [ 106.835874] mount_fs+0xae/0x328 [ 106.839253] vfs_kern_mount.part.34+0xd4/0x4d0 [ 106.843844] ? may_umount+0xb0/0xb0 [ 106.847478] ? _raw_read_unlock+0x22/0x30 [ 106.851636] ? __get_fs_type+0x97/0xc0 [ 106.855549] do_mount+0x564/0x3070 [ 106.859094] ? do_raw_spin_unlock+0x9e/0x2e0 [ 106.863510] ? copy_mount_string+0x40/0x40 [ 106.867753] ? rcu_pm_notify+0xc0/0xc0 [ 106.871657] ? copy_mount_options+0x5f/0x380 [ 106.876071] ? rcu_read_lock_sched_held+0x108/0x120 [ 106.881094] ? kmem_cache_alloc_trace+0x616/0x780 [ 106.885946] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 106.891499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 106.897125] ? copy_mount_options+0x285/0x380 [ 106.901631] ksys_mount+0x12d/0x140 [ 106.905264] SyS_mount+0x35/0x50 [ 106.908633] ? ksys_mount+0x140/0x140 [ 106.912436] do_syscall_64+0x29e/0x9d0 [ 106.916319] ? vmalloc_sync_all+0x30/0x30 [ 106.920450] ? _raw_spin_unlock_irq+0x27/0x70 [ 106.924945] ? finish_task_switch+0x1ca/0x820 [ 106.929442] ? syscall_return_slowpath+0x5c0/0x5c0 [ 106.934369] ? syscall_return_slowpath+0x30f/0x5c0 [ 106.939298] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 106.944654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 106.949491] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 106.954662] RIP: 0033:0x455279 [ 106.957830] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 106.965519] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 106.972769] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 106.980028] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 2018/04/12 00:58:37 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653099", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:37 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:37 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x0, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:37 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0x0, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 106.987288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 106.994543] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000028 [ 107.002266] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry mount [ 107.014180] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:37 executing program 1 (fault-call:5 fault-nth:41): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 107.100793] FAULT_INJECTION: forcing a failure. [ 107.100793] name failslab, interval 1, probability 0, space 0, times 0 [ 107.112165] CPU: 1 PID: 9744 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 107.119009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.128365] Call Trace: [ 107.130965] dump_stack+0x1b9/0x294 [ 107.134608] ? dump_stack_print_info.cold.2+0x52/0x52 [ 107.139805] ? perf_trace_lock_acquire+0xe3/0x980 [ 107.144672] should_fail.cold.4+0xa/0x1a [ 107.148748] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 107.153867] ? graph_lock+0x170/0x170 [ 107.157685] ? find_held_lock+0x36/0x1c0 [ 107.161752] ? __lock_is_held+0xb5/0x140 [ 107.165814] ? check_same_owner+0x320/0x320 [ 107.170129] ? rcu_note_context_switch+0x710/0x710 [ 107.175050] ? lock_downgrade+0x8e0/0x8e0 [ 107.179192] __should_failslab+0x124/0x180 [ 107.183422] should_failslab+0x9/0x14 [ 107.187206] kmem_cache_alloc+0x2af/0x760 [ 107.191347] __d_alloc+0xc1/0xc00 [ 107.194791] ? shrink_dcache_for_umount+0x290/0x290 [ 107.199793] ? d_alloc_parallel+0x1e80/0x1e80 [ 107.204277] ? lock_release+0xa10/0xa10 [ 107.208257] ? mark_held_locks+0xc9/0x160 [ 107.212389] ? d_lookup+0x254/0x330 [ 107.216011] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 107.221020] ? d_lookup+0x219/0x330 [ 107.224637] d_alloc+0x8e/0x370 [ 107.227907] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.233428] ? __d_alloc+0xc00/0xc00 [ 107.237124] ? full_name_hash+0xc0/0x100 [ 107.241178] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 107.246439] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 107.250669] rpc_populate.constprop.16+0x99/0x390 [ 107.255500] rpc_fill_super+0x3c9/0xbb0 [ 107.259462] ? cap_capable+0x1f9/0x260 [ 107.263337] ? rpc_pipe_release+0xb70/0xb70 [ 107.267648] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.273167] ? security_capable+0x99/0xc0 [ 107.277302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.282828] ? ns_capable_common+0x13f/0x170 [ 107.287222] mount_ns+0x12a/0x1d0 [ 107.290659] ? rpc_pipe_release+0xb70/0xb70 [ 107.294969] rpc_mount+0x9e/0xd0 [ 107.298325] mount_fs+0xae/0x328 [ 107.301681] vfs_kern_mount.part.34+0xd4/0x4d0 [ 107.306255] ? may_umount+0xb0/0xb0 [ 107.309951] ? _raw_read_unlock+0x22/0x30 [ 107.314083] ? __get_fs_type+0x97/0xc0 [ 107.317956] do_mount+0x564/0x3070 [ 107.321482] ? copy_mount_string+0x40/0x40 [ 107.325700] ? rcu_pm_notify+0xc0/0xc0 [ 107.329575] ? copy_mount_options+0x5f/0x380 [ 107.333965] ? rcu_read_lock_sched_held+0x108/0x120 [ 107.338968] ? kmem_cache_alloc_trace+0x616/0x780 [ 107.343796] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 107.349322] ? _copy_from_user+0xdf/0x150 [ 107.353458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.358976] ? copy_mount_options+0x285/0x380 [ 107.363460] ksys_mount+0x12d/0x140 [ 107.367071] SyS_mount+0x35/0x50 [ 107.370423] ? ksys_mount+0x140/0x140 [ 107.374212] do_syscall_64+0x29e/0x9d0 [ 107.378081] ? vmalloc_sync_all+0x30/0x30 [ 107.382212] ? kasan_check_write+0x14/0x20 [ 107.386432] ? syscall_return_slowpath+0x5c0/0x5c0 [ 107.391347] ? syscall_return_slowpath+0x30f/0x5c0 [ 107.396266] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 107.401616] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.406447] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 107.411617] RIP: 0033:0x455279 [ 107.414794] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 107.422490] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 107.429742] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 107.436996] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 107.444252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 107.451502] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000029 [ 107.487689] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:38 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x0, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:38 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:38 executing program 1 (fault-call:5 fault-nth:42): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 107.732530] FAULT_INJECTION: forcing a failure. [ 107.732530] name failslab, interval 1, probability 0, space 0, times 0 [ 107.743863] CPU: 1 PID: 9779 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 107.750710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.760063] Call Trace: [ 107.762662] dump_stack+0x1b9/0x294 [ 107.766310] ? dump_stack_print_info.cold.2+0x52/0x52 [ 107.771499] ? perf_trace_lock_acquire+0xe3/0x980 [ 107.776327] ? graph_lock+0x170/0x170 [ 107.780119] should_fail.cold.4+0xa/0x1a [ 107.784167] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 107.789255] ? perf_trace_lock+0x900/0x900 [ 107.793477] ? graph_lock+0x170/0x170 [ 107.797267] ? graph_lock+0x170/0x170 [ 107.801056] ? find_held_lock+0x36/0x1c0 [ 107.805109] ? __lock_is_held+0xb5/0x140 [ 107.809169] ? check_same_owner+0x320/0x320 [ 107.813482] ? rcu_note_context_switch+0x710/0x710 [ 107.818403] __should_failslab+0x124/0x180 [ 107.822625] should_failslab+0x9/0x14 [ 107.826413] kmem_cache_alloc+0x2af/0x760 [ 107.830549] ? rpc_i_callback+0x30/0x30 [ 107.834507] rpc_alloc_inode+0x1a/0x20 [ 107.838382] alloc_inode+0x63/0x190 [ 107.842000] new_inode_pseudo+0x69/0x1a0 [ 107.846055] ? prune_icache_sb+0x1a0/0x1a0 [ 107.850281] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 107.854849] ? kasan_check_write+0x14/0x20 [ 107.859070] ? do_raw_spin_lock+0xc1/0x200 [ 107.863290] new_inode+0x1c/0x40 [ 107.866645] rpc_get_inode+0x1e/0x1f0 [ 107.870429] ? d_drop+0x5a/0x70 [ 107.873695] __rpc_create_common+0x5d/0x190 [ 107.878007] rpc_populate.constprop.16+0x11f/0x390 [ 107.882935] rpc_fill_super+0x3c9/0xbb0 [ 107.886896] ? cap_capable+0x1f9/0x260 [ 107.890769] ? rpc_pipe_release+0xb70/0xb70 [ 107.895079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.900602] ? security_capable+0x99/0xc0 [ 107.904736] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.910263] ? ns_capable_common+0x13f/0x170 [ 107.914657] mount_ns+0x12a/0x1d0 [ 107.918097] ? rpc_pipe_release+0xb70/0xb70 [ 107.922407] rpc_mount+0x9e/0xd0 [ 107.925759] mount_fs+0xae/0x328 [ 107.929115] vfs_kern_mount.part.34+0xd4/0x4d0 [ 107.933682] ? may_umount+0xb0/0xb0 [ 107.937294] ? _raw_read_unlock+0x22/0x30 [ 107.941424] ? __get_fs_type+0x97/0xc0 [ 107.945299] do_mount+0x564/0x3070 [ 107.948824] ? do_raw_spin_unlock+0x9e/0x2e0 [ 107.953219] ? copy_mount_string+0x40/0x40 [ 107.957439] ? rcu_pm_notify+0xc0/0xc0 [ 107.961316] ? copy_mount_options+0x5f/0x380 [ 107.965711] ? rcu_read_lock_sched_held+0x108/0x120 [ 107.970720] ? kmem_cache_alloc_trace+0x616/0x780 [ 107.975551] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 107.981079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 107.986602] ? copy_mount_options+0x285/0x380 [ 107.991086] ksys_mount+0x12d/0x140 [ 107.994697] SyS_mount+0x35/0x50 [ 107.998048] ? ksys_mount+0x140/0x140 [ 108.001836] do_syscall_64+0x29e/0x9d0 [ 108.005708] ? vmalloc_sync_all+0x30/0x30 [ 108.009838] ? _raw_spin_unlock_irq+0x27/0x70 [ 108.014317] ? finish_task_switch+0x1ca/0x820 [ 108.018798] ? syscall_return_slowpath+0x5c0/0x5c0 [ 108.023711] ? syscall_return_slowpath+0x30f/0x5c0 [ 108.028627] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 108.033978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 108.038808] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 108.043978] RIP: 0033:0x455279 [ 108.047150] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 108.054846] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 108.062101] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 108.069353] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 108.076608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:38 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:38 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:38 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:38 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:38 executing program 1 (fault-call:5 fault-nth:43): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:38 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x0, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:38 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:38 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x0, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 108.083862] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002a [ 108.091342] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfs [ 108.110680] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 108.247960] FAULT_INJECTION: forcing a failure. [ 108.247960] name failslab, interval 1, probability 0, space 0, times 0 [ 108.259291] CPU: 1 PID: 9810 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 108.266135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.275486] Call Trace: [ 108.278083] dump_stack+0x1b9/0x294 [ 108.281723] ? dump_stack_print_info.cold.2+0x52/0x52 [ 108.286918] ? perf_trace_lock_acquire+0xe3/0x980 [ 108.291780] should_fail.cold.4+0xa/0x1a [ 108.295860] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 108.300979] ? graph_lock+0x170/0x170 [ 108.304794] ? find_held_lock+0x36/0x1c0 [ 108.308868] ? __lock_is_held+0xb5/0x140 [ 108.312954] ? check_same_owner+0x320/0x320 [ 108.317292] ? rcu_note_context_switch+0x710/0x710 [ 108.322237] ? lock_downgrade+0x8e0/0x8e0 [ 108.326404] __should_failslab+0x124/0x180 [ 108.330650] should_failslab+0x9/0x14 [ 108.334459] kmem_cache_alloc+0x2af/0x760 [ 108.338622] __d_alloc+0xc1/0xc00 [ 108.342087] ? shrink_dcache_for_umount+0x290/0x290 [ 108.347117] ? d_alloc_parallel+0x1e80/0x1e80 [ 108.351623] ? lock_release+0xa10/0xa10 [ 108.355609] ? mark_held_locks+0xc9/0x160 [ 108.359771] ? d_lookup+0x254/0x330 [ 108.363413] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 108.368434] ? d_lookup+0x219/0x330 [ 108.372063] d_alloc+0x8e/0x370 [ 108.375355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.380900] ? __d_alloc+0xc00/0xc00 [ 108.384626] ? full_name_hash+0xc0/0x100 [ 108.388709] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 108.393993] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 108.398251] rpc_populate.constprop.16+0x99/0x390 [ 108.403117] rpc_fill_super+0x3c9/0xbb0 [ 108.407101] ? cap_capable+0x1f9/0x260 [ 108.410996] ? rpc_pipe_release+0xb70/0xb70 [ 108.415331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.420875] ? security_capable+0x99/0xc0 [ 108.425032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.430574] ? ns_capable_common+0x13f/0x170 [ 108.434992] mount_ns+0x12a/0x1d0 [ 108.438454] ? rpc_pipe_release+0xb70/0xb70 [ 108.442786] rpc_mount+0x9e/0xd0 [ 108.446161] mount_fs+0xae/0x328 [ 108.449540] vfs_kern_mount.part.34+0xd4/0x4d0 [ 108.454133] ? may_umount+0xb0/0xb0 [ 108.457766] ? _raw_read_unlock+0x22/0x30 [ 108.461926] ? __get_fs_type+0x97/0xc0 [ 108.465824] do_mount+0x564/0x3070 [ 108.469373] ? copy_mount_string+0x40/0x40 [ 108.473613] ? rcu_pm_notify+0xc0/0xc0 [ 108.477512] ? copy_mount_options+0x5f/0x380 [ 108.481923] ? rcu_read_lock_sched_held+0x108/0x120 [ 108.486945] ? kmem_cache_alloc_trace+0x616/0x780 [ 108.491808] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 108.497353] ? _copy_from_user+0xdf/0x150 [ 108.501511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 108.507052] ? copy_mount_options+0x285/0x380 [ 108.511557] ksys_mount+0x12d/0x140 [ 108.515192] SyS_mount+0x35/0x50 [ 108.518570] ? ksys_mount+0x140/0x140 [ 108.522385] do_syscall_64+0x29e/0x9d0 [ 108.526289] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 108.531134] ? syscall_return_slowpath+0x5c0/0x5c0 [ 108.536068] ? syscall_return_slowpath+0x30f/0x5c0 [ 108.541009] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 108.546381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 108.551239] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 108.556434] RIP: 0033:0x455279 [ 108.559625] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 108.567339] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 108.574607] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 108.581874] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 108.589147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530fe", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531f0", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:39 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653018", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 108.596419] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002b [ 108.668427] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:39 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x0, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:39 executing program 1 (fault-call:5 fault-nth:44): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:39 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 108.879602] FAULT_INJECTION: forcing a failure. [ 108.879602] name failslab, interval 1, probability 0, space 0, times 0 [ 108.890972] CPU: 0 PID: 9871 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 108.897833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.907205] Call Trace: [ 108.909813] dump_stack+0x1b9/0x294 [ 108.913473] ? dump_stack_print_info.cold.2+0x52/0x52 [ 108.918714] should_fail.cold.4+0xa/0x1a [ 108.922804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 108.927937] ? perf_trace_lock+0x900/0x900 [ 108.932194] ? graph_lock+0x170/0x170 [ 108.936009] ? memset+0x31/0x40 [ 108.939321] ? find_held_lock+0x36/0x1c0 [ 108.943409] ? __lock_is_held+0xb5/0x140 [ 108.947513] ? check_same_owner+0x320/0x320 [ 108.951857] ? rcu_note_context_switch+0x710/0x710 [ 108.956821] __should_failslab+0x124/0x180 [ 108.961077] should_failslab+0x9/0x14 [ 108.964891] kmem_cache_alloc+0x2af/0x760 [ 108.969070] ? rpc_i_callback+0x30/0x30 [ 108.973068] rpc_alloc_inode+0x1a/0x20 2018/04/12 00:58:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653099", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:39 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:39 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 108.976978] alloc_inode+0x63/0x190 [ 108.980629] new_inode_pseudo+0x69/0x1a0 [ 108.984717] ? prune_icache_sb+0x1a0/0x1a0 [ 108.988971] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 108.993581] ? kasan_check_write+0x14/0x20 [ 108.997837] ? do_raw_spin_lock+0xc1/0x200 [ 109.002101] new_inode+0x1c/0x40 [ 109.005493] rpc_get_inode+0x1e/0x1f0 [ 109.009318] ? d_drop+0x5a/0x70 [ 109.012622] __rpc_create_common+0x5d/0x190 [ 109.016974] rpc_populate.constprop.16+0x11f/0x390 [ 109.021937] rpc_fill_super+0x3c9/0xbb0 [ 109.025940] ? cap_capable+0x1f9/0x260 [ 109.029849] ? rpc_pipe_release+0xb70/0xb70 [ 109.034190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.039743] ? security_capable+0x99/0xc0 [ 109.043912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.049463] ? ns_capable_common+0x13f/0x170 [ 109.053895] mount_ns+0x12a/0x1d0 [ 109.057366] ? rpc_pipe_release+0xb70/0xb70 [ 109.061715] rpc_mount+0x9e/0xd0 [ 109.065103] mount_fs+0xae/0x328 [ 109.068491] vfs_kern_mount.part.34+0xd4/0x4d0 [ 109.073094] ? may_umount+0xb0/0xb0 2018/04/12 00:58:39 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530fd", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 109.076738] ? _raw_read_unlock+0x22/0x30 [ 109.080905] ? __get_fs_type+0x97/0xc0 [ 109.084814] do_mount+0x564/0x3070 [ 109.088381] ? copy_mount_string+0x40/0x40 [ 109.092624] ? rcu_pm_notify+0xc0/0xc0 [ 109.096540] ? copy_mount_options+0x5f/0x380 [ 109.100964] ? rcu_read_lock_sched_held+0x108/0x120 [ 109.105997] ? kmem_cache_alloc_trace+0x616/0x780 [ 109.110861] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 109.116412] ? _copy_from_user+0xdf/0x150 [ 109.120588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.126137] ? copy_mount_options+0x285/0x380 2018/04/12 00:58:39 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 109.130658] ksys_mount+0x12d/0x140 [ 109.134312] SyS_mount+0x35/0x50 [ 109.137696] ? ksys_mount+0x140/0x140 [ 109.141514] do_syscall_64+0x29e/0x9d0 [ 109.145419] ? vmalloc_sync_all+0x30/0x30 [ 109.149578] ? _raw_spin_unlock_irq+0x27/0x70 [ 109.154088] ? finish_task_switch+0x1ca/0x820 [ 109.158606] ? syscall_return_slowpath+0x5c0/0x5c0 [ 109.163551] ? syscall_return_slowpath+0x30f/0x5c0 [ 109.168505] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 109.173899] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/04/12 00:58:40 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x0, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 109.178774] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 109.183973] RIP: 0033:0x455279 [ 109.187171] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 109.194898] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 109.202175] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 109.209454] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 109.216736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 109.224017] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002c 2018/04/12 00:58:40 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 109.231879] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry statd [ 109.257989] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:40 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x0, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 1 (fault-call:5 fault-nth:45): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0z', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x0, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:40 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531ff", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:40 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 109.623196] FAULT_INJECTION: forcing a failure. [ 109.623196] name failslab, interval 1, probability 0, space 0, times 0 [ 109.634507] CPU: 0 PID: 9933 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 109.641359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.650728] Call Trace: [ 109.653340] dump_stack+0x1b9/0x294 [ 109.657002] ? dump_stack_print_info.cold.2+0x52/0x52 [ 109.662241] should_fail.cold.4+0xa/0x1a [ 109.666329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 109.671462] ? graph_lock+0x170/0x170 [ 109.675299] ? find_held_lock+0x36/0x1c0 [ 109.679392] ? __lock_is_held+0xb5/0x140 [ 109.683503] ? check_same_owner+0x320/0x320 [ 109.687849] ? rcu_note_context_switch+0x710/0x710 [ 109.692793] ? lock_downgrade+0x8e0/0x8e0 [ 109.696961] __should_failslab+0x124/0x180 [ 109.701200] should_failslab+0x9/0x14 [ 109.704995] kmem_cache_alloc+0x2af/0x760 [ 109.709166] __d_alloc+0xc1/0xc00 [ 109.712627] ? shrink_dcache_for_umount+0x290/0x290 [ 109.717644] ? d_alloc_parallel+0x1e80/0x1e80 [ 109.722136] ? lock_release+0xa10/0xa10 [ 109.726106] ? mark_held_locks+0xc9/0x160 [ 109.730249] ? d_lookup+0x254/0x330 [ 109.733875] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 109.738882] ? d_lookup+0x219/0x330 [ 109.742503] d_alloc+0x8e/0x370 [ 109.745775] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.751300] ? __d_alloc+0xc00/0xc00 [ 109.755002] ? full_name_hash+0xc0/0x100 [ 109.759079] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 109.764346] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 109.768586] rpc_populate.constprop.16+0x99/0x390 [ 109.773436] rpc_fill_super+0x3c9/0xbb0 [ 109.777409] ? cap_capable+0x1f9/0x260 [ 109.781290] ? rpc_pipe_release+0xb70/0xb70 [ 109.785609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.791138] ? security_capable+0x99/0xc0 [ 109.795278] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.800807] ? ns_capable_common+0x13f/0x170 [ 109.805210] mount_ns+0x12a/0x1d0 [ 109.808655] ? rpc_pipe_release+0xb70/0xb70 [ 109.812970] rpc_mount+0x9e/0xd0 [ 109.816333] mount_fs+0xae/0x328 [ 109.819700] vfs_kern_mount.part.34+0xd4/0x4d0 [ 109.824275] ? may_umount+0xb0/0xb0 [ 109.827895] ? _raw_read_unlock+0x22/0x30 [ 109.832044] ? __get_fs_type+0x97/0xc0 [ 109.835932] do_mount+0x564/0x3070 [ 109.839478] ? copy_mount_string+0x40/0x40 [ 109.843708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 109.848470] ? retint_kernel+0x10/0x10 [ 109.852356] ? copy_mount_options+0x1a1/0x380 [ 109.856844] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 109.861681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 109.867205] ? copy_mount_options+0x285/0x380 [ 109.871699] ksys_mount+0x12d/0x140 [ 109.875319] SyS_mount+0x35/0x50 [ 109.878676] ? ksys_mount+0x140/0x140 [ 109.882469] do_syscall_64+0x29e/0x9d0 [ 109.886348] ? syscall_slow_exit_work+0x4f0/0x4f0 [ 109.891191] ? syscall_return_slowpath+0x5c0/0x5c0 [ 109.896115] ? syscall_return_slowpath+0x30f/0x5c0 [ 109.901050] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 109.906417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 109.911256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 109.916434] RIP: 0033:0x455279 2018/04/12 00:58:40 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 109.919615] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 109.927318] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 109.934576] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 109.941837] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 109.949095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 109.956352] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002d 2018/04/12 00:58:40 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x0, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 110.000802] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:40 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:40 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:40 executing program 1 (fault-call:5 fault-nth:46): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 110.295919] FAULT_INJECTION: forcing a failure. [ 110.295919] name failslab, interval 1, probability 0, space 0, times 0 [ 110.307376] CPU: 0 PID: 9974 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 110.314228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.323595] Call Trace: [ 110.326208] dump_stack+0x1b9/0x294 [ 110.329860] ? dump_stack_print_info.cold.2+0x52/0x52 [ 110.335088] should_fail.cold.4+0xa/0x1a [ 110.339179] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 110.344315] ? graph_lock+0x170/0x170 [ 110.348156] ? find_held_lock+0x36/0x1c0 [ 110.352249] ? __lock_is_held+0xb5/0x140 [ 110.356325] ? check_same_owner+0x320/0x320 [ 110.360657] ? rcu_note_context_switch+0x710/0x710 [ 110.365580] ? lock_downgrade+0x8e0/0x8e0 [ 110.369723] __should_failslab+0x124/0x180 [ 110.373951] should_failslab+0x9/0x14 [ 110.377742] kmem_cache_alloc+0x2af/0x760 [ 110.381895] __d_alloc+0xc1/0xc00 [ 110.385342] ? shrink_dcache_for_umount+0x290/0x290 [ 110.390350] ? d_alloc_parallel+0x1e80/0x1e80 [ 110.394837] ? lock_release+0xa10/0xa10 [ 110.398802] ? mark_held_locks+0xc9/0x160 [ 110.402937] ? d_lookup+0x254/0x330 [ 110.406576] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 110.411582] ? d_lookup+0x219/0x330 [ 110.415214] d_alloc+0x8e/0x370 [ 110.418495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.424038] ? __d_alloc+0xc00/0xc00 [ 110.427745] ? full_name_hash+0xc0/0x100 [ 110.431804] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 110.437082] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 110.441326] rpc_populate.constprop.16+0x99/0x390 [ 110.446161] rpc_fill_super+0x3c9/0xbb0 [ 110.450127] ? cap_capable+0x1f9/0x260 [ 110.454012] ? rpc_pipe_release+0xb70/0xb70 [ 110.458351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.463874] ? security_capable+0x99/0xc0 [ 110.468021] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.473577] ? ns_capable_common+0x13f/0x170 [ 110.477977] mount_ns+0x12a/0x1d0 [ 110.481418] ? rpc_pipe_release+0xb70/0xb70 [ 110.485732] rpc_mount+0x9e/0xd0 [ 110.489096] mount_fs+0xae/0x328 [ 110.492459] vfs_kern_mount.part.34+0xd4/0x4d0 [ 110.497046] ? may_umount+0xb0/0xb0 [ 110.500668] ? _raw_read_unlock+0x22/0x30 [ 110.504803] ? __get_fs_type+0x97/0xc0 [ 110.508683] do_mount+0x564/0x3070 [ 110.512214] ? copy_mount_string+0x40/0x40 [ 110.516436] ? rcu_pm_notify+0xc0/0xc0 [ 110.520316] ? copy_mount_options+0x5f/0x380 [ 110.524712] ? rcu_read_lock_sched_held+0x108/0x120 [ 110.529717] ? kmem_cache_alloc_trace+0x616/0x780 [ 110.534556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 110.540081] ? _copy_from_user+0xdf/0x150 [ 110.544221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.549743] ? copy_mount_options+0x285/0x380 [ 110.554242] ksys_mount+0x12d/0x140 [ 110.557870] SyS_mount+0x35/0x50 [ 110.561223] ? ksys_mount+0x140/0x140 [ 110.565033] do_syscall_64+0x29e/0x9d0 [ 110.568918] ? vmalloc_sync_all+0x30/0x30 [ 110.573065] ? _raw_spin_unlock_irq+0x27/0x70 [ 110.577561] ? finish_task_switch+0x1ca/0x820 [ 110.582050] ? syscall_return_slowpath+0x5c0/0x5c0 [ 110.586976] ? syscall_return_slowpath+0x30f/0x5c0 [ 110.591899] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 110.597256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 110.602091] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 110.607267] RIP: 0033:0x455279 [ 110.610445] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 110.618144] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 110.625404] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 110.632672] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 110.639927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0H', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:41 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:41 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531c0", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:41 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:41 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:41 executing program 1 (fault-call:5 fault-nth:47): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:41 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0c', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 110.647181] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002e [ 110.655200] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 110.775758] FAULT_INJECTION: forcing a failure. [ 110.775758] name failslab, interval 1, probability 0, space 0, times 0 [ 110.787073] CPU: 0 PID: 10009 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 110.794012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.803377] Call Trace: [ 110.805984] dump_stack+0x1b9/0x294 [ 110.809636] ? dump_stack_print_info.cold.2+0x52/0x52 [ 110.814871] should_fail.cold.4+0xa/0x1a [ 110.818959] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/12 00:58:41 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 110.824086] ? perf_trace_lock+0x900/0x900 [ 110.828339] ? graph_lock+0x170/0x170 [ 110.832157] ? memset+0x31/0x40 [ 110.835468] ? find_held_lock+0x36/0x1c0 [ 110.839563] ? __lock_is_held+0xb5/0x140 [ 110.843668] ? check_same_owner+0x320/0x320 [ 110.848017] ? rcu_note_context_switch+0x710/0x710 [ 110.852975] __should_failslab+0x124/0x180 [ 110.857233] should_failslab+0x9/0x14 [ 110.861050] kmem_cache_alloc+0x2af/0x760 [ 110.865230] ? rpc_i_callback+0x30/0x30 [ 110.869226] rpc_alloc_inode+0x1a/0x20 2018/04/12 00:58:41 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 110.873128] alloc_inode+0x63/0x190 [ 110.876778] new_inode_pseudo+0x69/0x1a0 [ 110.880861] ? prune_icache_sb+0x1a0/0x1a0 [ 110.885112] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 110.889717] ? kasan_check_write+0x14/0x20 [ 110.893967] ? do_raw_spin_lock+0xc1/0x200 [ 110.898223] new_inode+0x1c/0x40 [ 110.901609] rpc_get_inode+0x1e/0x1f0 [ 110.905429] ? d_drop+0x5a/0x70 [ 110.908731] __rpc_create_common+0x5d/0x190 [ 110.913084] rpc_populate.constprop.16+0x11f/0x390 [ 110.918053] rpc_fill_super+0x3c9/0xbb0 [ 110.922051] ? cap_capable+0x1f9/0x260 2018/04/12 00:58:41 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 110.925958] ? rpc_pipe_release+0xb70/0xb70 [ 110.930303] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.935856] ? security_capable+0x99/0xc0 [ 110.940028] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 110.945579] ? ns_capable_common+0x13f/0x170 [ 110.950011] mount_ns+0x12a/0x1d0 [ 110.953480] ? rpc_pipe_release+0xb70/0xb70 [ 110.957833] rpc_mount+0x9e/0xd0 [ 110.961228] mount_fs+0xae/0x328 [ 110.964617] vfs_kern_mount.part.34+0xd4/0x4d0 [ 110.969221] ? may_umount+0xb0/0xb0 2018/04/12 00:58:41 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:41 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:41 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 110.972863] ? _raw_read_unlock+0x22/0x30 [ 110.977023] ? __get_fs_type+0x97/0xc0 [ 110.980939] do_mount+0x564/0x3070 [ 110.984495] ? do_raw_spin_unlock+0x9e/0x2e0 [ 110.988948] ? copy_mount_string+0x40/0x40 [ 110.993200] ? rcu_pm_notify+0xc0/0xc0 [ 110.997116] ? copy_mount_options+0x5f/0x380 [ 111.001536] ? rcu_read_lock_sched_held+0x108/0x120 [ 111.006566] ? kmem_cache_alloc_trace+0x616/0x780 [ 111.011432] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 111.016996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.022550] ? copy_mount_options+0x285/0x380 [ 111.027073] ksys_mount+0x12d/0x140 [ 111.030719] SyS_mount+0x35/0x50 [ 111.034099] ? ksys_mount+0x140/0x140 [ 111.037927] do_syscall_64+0x29e/0x9d0 [ 111.041834] ? vmalloc_sync_all+0x30/0x30 [ 111.045989] ? _raw_spin_unlock_irq+0x27/0x70 [ 111.050508] ? finish_task_switch+0x1ca/0x820 [ 111.055022] ? syscall_return_slowpath+0x5c0/0x5c0 [ 111.059973] ? syscall_return_slowpath+0x30f/0x5c0 [ 111.064935] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 111.070327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 111.075202] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 111.080400] RIP: 0033:0x455279 [ 111.083600] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 111.091329] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 111.098609] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 111.105887] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 111.113164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 111.120446] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000002f [ 111.128081] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd4_cb [ 111.153980] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653099", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x0, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:42 executing program 1 (fault-call:5 fault-nth:48): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c653103", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 111.378161] FAULT_INJECTION: forcing a failure. [ 111.378161] name failslab, interval 1, probability 0, space 0, times 0 [ 111.389491] CPU: 0 PID: 10055 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 111.396436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.405806] Call Trace: [ 111.408417] dump_stack+0x1b9/0x294 [ 111.412075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 111.417304] should_fail.cold.4+0xa/0x1a [ 111.421395] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/12 00:58:42 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)="2e2f66696c6531fe", &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 111.426542] ? perf_trace_lock+0x900/0x900 [ 111.430792] ? graph_lock+0x170/0x170 [ 111.434606] ? memset+0x31/0x40 [ 111.437912] ? find_held_lock+0x36/0x1c0 [ 111.442000] ? __lock_is_held+0xb5/0x140 [ 111.446109] ? check_same_owner+0x320/0x320 [ 111.450454] ? rcu_note_context_switch+0x710/0x710 [ 111.455419] __should_failslab+0x124/0x180 [ 111.459680] should_failslab+0x9/0x14 [ 111.463505] kmem_cache_alloc+0x2af/0x760 [ 111.467684] ? rpc_i_callback+0x30/0x30 [ 111.471676] rpc_alloc_inode+0x1a/0x20 [ 111.475573] alloc_inode+0x63/0x190 [ 111.479220] new_inode_pseudo+0x69/0x1a0 [ 111.483305] ? prune_icache_sb+0x1a0/0x1a0 [ 111.487559] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 111.492167] ? kasan_check_write+0x14/0x20 [ 111.496420] ? do_raw_spin_lock+0xc1/0x200 [ 111.500675] new_inode+0x1c/0x40 [ 111.504063] rpc_get_inode+0x1e/0x1f0 [ 111.507878] ? d_drop+0x5a/0x70 [ 111.511178] __rpc_create_common+0x5d/0x190 [ 111.515530] rpc_populate.constprop.16+0x11f/0x390 [ 111.520496] rpc_fill_super+0x3c9/0xbb0 [ 111.524498] ? cap_capable+0x1f9/0x260 2018/04/12 00:58:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 111.528405] ? rpc_pipe_release+0xb70/0xb70 [ 111.532749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.538302] ? security_capable+0x99/0xc0 [ 111.542486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.548037] ? ns_capable_common+0x13f/0x170 [ 111.552477] mount_ns+0x12a/0x1d0 [ 111.555940] ? rpc_pipe_release+0xb70/0xb70 [ 111.560283] rpc_mount+0x9e/0xd0 [ 111.563666] mount_fs+0xae/0x328 [ 111.567062] vfs_kern_mount.part.34+0xd4/0x4d0 [ 111.571669] ? may_umount+0xb0/0xb0 [ 111.575314] ? _raw_read_unlock+0x22/0x30 [ 111.579484] ? __get_fs_type+0x97/0xc0 [ 111.583398] do_mount+0x564/0x3070 [ 111.586965] ? copy_mount_string+0x40/0x40 [ 111.591216] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 111.596252] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 111.601035] ? retint_kernel+0x10/0x10 [ 111.604953] ? copy_mount_options+0x213/0x380 [ 111.609470] ? copy_mount_options+0x19c/0x380 [ 111.613982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 111.619530] ? copy_mount_options+0x285/0x380 [ 111.624045] ksys_mount+0x12d/0x140 [ 111.627697] SyS_mount+0x35/0x50 [ 111.631077] ? ksys_mount+0x140/0x140 [ 111.634895] do_syscall_64+0x29e/0x9d0 [ 111.638883] ? vmalloc_sync_all+0x30/0x30 [ 111.643047] ? _raw_spin_unlock_irq+0x27/0x70 [ 111.647555] ? finish_task_switch+0x1ca/0x820 [ 111.652066] ? syscall_return_slowpath+0x5c0/0x5c0 [ 111.657022] ? syscall_return_slowpath+0x30f/0x5c0 [ 111.661978] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 111.667370] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 111.672243] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 111.677448] RIP: 0033:0x455279 [ 111.680651] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 111.688375] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 111.696091] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 111.703370] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 111.710645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 111.717919] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000030 [ 111.726749] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry cache [ 111.748500] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:42 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 1 (fault-call:5 fault-nth:49): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x0, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 111.917699] FAULT_INJECTION: forcing a failure. [ 111.917699] name failslab, interval 1, probability 0, space 0, times 0 [ 111.929055] CPU: 0 PID: 10093 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 111.936006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.945374] Call Trace: [ 111.947985] dump_stack+0x1b9/0x294 [ 111.951651] ? dump_stack_print_info.cold.2+0x52/0x52 [ 111.956885] should_fail.cold.4+0xa/0x1a [ 111.960971] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/04/12 00:58:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 111.966103] ? graph_lock+0x170/0x170 [ 111.969936] ? find_held_lock+0x36/0x1c0 [ 111.974024] ? __lock_is_held+0xb5/0x140 [ 111.978129] ? check_same_owner+0x320/0x320 [ 111.982476] ? rcu_note_context_switch+0x710/0x710 [ 111.987417] ? lock_downgrade+0x8e0/0x8e0 [ 111.991599] __should_failslab+0x124/0x180 [ 111.995859] should_failslab+0x9/0x14 [ 111.999682] kmem_cache_alloc+0x2af/0x760 [ 112.003866] __d_alloc+0xc1/0xc00 [ 112.007351] ? shrink_dcache_for_umount+0x290/0x290 [ 112.012389] ? d_alloc_parallel+0x1e80/0x1e80 [ 112.016918] ? lock_release+0xa10/0xa10 [ 112.020917] ? mark_held_locks+0xc9/0x160 [ 112.025084] ? d_lookup+0x254/0x330 [ 112.028740] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 112.033773] ? d_lookup+0x219/0x330 [ 112.037437] d_alloc+0x8e/0x370 [ 112.040744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.046296] ? __d_alloc+0xc00/0xc00 [ 112.050025] ? full_name_hash+0xc0/0x100 [ 112.054121] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 112.059416] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 112.063696] rpc_populate.constprop.16+0x99/0x390 [ 112.068575] rpc_fill_super+0x3c9/0xbb0 [ 112.072569] ? cap_capable+0x1f9/0x260 [ 112.076474] ? rpc_pipe_release+0xb70/0xb70 [ 112.080818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.086367] ? security_capable+0x99/0xc0 [ 112.090536] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.096086] ? ns_capable_common+0x13f/0x170 [ 112.100516] mount_ns+0x12a/0x1d0 [ 112.103982] ? rpc_pipe_release+0xb70/0xb70 [ 112.108323] rpc_mount+0x9e/0xd0 [ 112.111707] mount_fs+0xae/0x328 2018/04/12 00:58:42 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:42 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 112.115100] vfs_kern_mount.part.34+0xd4/0x4d0 [ 112.119704] ? may_umount+0xb0/0xb0 [ 112.123345] ? _raw_read_unlock+0x22/0x30 [ 112.127508] ? __get_fs_type+0x97/0xc0 [ 112.131429] do_mount+0x564/0x3070 [ 112.134994] ? copy_mount_string+0x40/0x40 [ 112.139240] ? rcu_pm_notify+0xc0/0xc0 [ 112.143154] ? copy_mount_options+0x5f/0x380 [ 112.147576] ? rcu_read_lock_sched_held+0x108/0x120 [ 112.152606] ? kmem_cache_alloc_trace+0x616/0x780 [ 112.157462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 112.163008] ? _copy_from_user+0xdf/0x150 2018/04/12 00:58:42 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:42 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 112.167177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.172714] ? copy_mount_options+0x285/0x380 [ 112.177233] ksys_mount+0x12d/0x140 [ 112.180880] SyS_mount+0x35/0x50 [ 112.184263] ? ksys_mount+0x140/0x140 [ 112.188084] do_syscall_64+0x29e/0x9d0 [ 112.191981] ? vmalloc_sync_all+0x30/0x30 [ 112.196144] ? _raw_spin_unlock_irq+0x27/0x70 [ 112.200658] ? finish_task_switch+0x1ca/0x820 [ 112.205176] ? syscall_return_slowpath+0x5c0/0x5c0 [ 112.210123] ? syscall_return_slowpath+0x30f/0x5c0 [ 112.215075] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 112.220466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 112.225336] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 112.230535] RIP: 0033:0x455279 [ 112.233732] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 112.241459] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 112.248742] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 112.256020] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 112.263311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 112.270594] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000031 [ 112.280601] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:43 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:43 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0P', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 1 (fault-call:5 fault-nth:50): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 112.608936] FAULT_INJECTION: forcing a failure. [ 112.608936] name failslab, interval 1, probability 0, space 0, times 0 [ 112.620251] CPU: 1 PID: 10162 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 112.627185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.636540] Call Trace: [ 112.639146] dump_stack+0x1b9/0x294 [ 112.642791] ? dump_stack_print_info.cold.2+0x52/0x52 [ 112.647992] ? perf_trace_lock_acquire+0xe3/0x980 [ 112.652847] ? graph_lock+0x170/0x170 [ 112.656674] should_fail.cold.4+0xa/0x1a [ 112.660751] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 112.665852] ? perf_trace_lock+0x900/0x900 [ 112.670071] ? graph_lock+0x170/0x170 [ 112.673855] ? graph_lock+0x170/0x170 [ 112.677641] ? find_held_lock+0x36/0x1c0 [ 112.681686] ? __lock_is_held+0xb5/0x140 [ 112.685736] ? check_same_owner+0x320/0x320 [ 112.690051] ? rcu_note_context_switch+0x710/0x710 [ 112.694975] __should_failslab+0x124/0x180 [ 112.699193] should_failslab+0x9/0x14 [ 112.702976] kmem_cache_alloc+0x2af/0x760 [ 112.707107] ? rpc_i_callback+0x30/0x30 [ 112.711063] rpc_alloc_inode+0x1a/0x20 [ 112.714940] alloc_inode+0x63/0x190 [ 112.718549] new_inode_pseudo+0x69/0x1a0 [ 112.722590] ? prune_icache_sb+0x1a0/0x1a0 [ 112.726806] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 112.731370] ? kasan_check_write+0x14/0x20 [ 112.735586] ? do_raw_spin_lock+0xc1/0x200 [ 112.739804] new_inode+0x1c/0x40 [ 112.743152] rpc_get_inode+0x1e/0x1f0 [ 112.746932] ? d_drop+0x5a/0x70 [ 112.750194] __rpc_create_common+0x5d/0x190 [ 112.754509] rpc_populate.constprop.16+0x11f/0x390 [ 112.759427] rpc_fill_super+0x3c9/0xbb0 [ 112.763386] ? cap_capable+0x1f9/0x260 [ 112.767255] ? rpc_pipe_release+0xb70/0xb70 [ 112.771563] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.777078] ? security_capable+0x99/0xc0 [ 112.781209] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.786728] ? ns_capable_common+0x13f/0x170 [ 112.791128] mount_ns+0x12a/0x1d0 [ 112.794563] ? rpc_pipe_release+0xb70/0xb70 [ 112.798869] rpc_mount+0x9e/0xd0 [ 112.802220] mount_fs+0xae/0x328 [ 112.805577] vfs_kern_mount.part.34+0xd4/0x4d0 [ 112.810142] ? may_umount+0xb0/0xb0 [ 112.813747] ? _raw_read_unlock+0x22/0x30 [ 112.817877] ? __get_fs_type+0x97/0xc0 [ 112.821749] do_mount+0x564/0x3070 [ 112.825274] ? copy_mount_string+0x40/0x40 [ 112.829498] ? rcu_pm_notify+0xc0/0xc0 [ 112.833374] ? copy_mount_options+0x5f/0x380 [ 112.837761] ? rcu_read_lock_sched_held+0x108/0x120 [ 112.842769] ? kmem_cache_alloc_trace+0x616/0x780 [ 112.847611] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 112.853128] ? _copy_from_user+0xdf/0x150 [ 112.857261] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 112.862784] ? copy_mount_options+0x285/0x380 [ 112.867264] ksys_mount+0x12d/0x140 [ 112.870875] SyS_mount+0x35/0x50 [ 112.874221] ? ksys_mount+0x140/0x140 [ 112.878008] do_syscall_64+0x29e/0x9d0 [ 112.881885] ? vmalloc_sync_all+0x30/0x30 [ 112.886022] ? _raw_spin_unlock_irq+0x27/0x70 [ 112.890510] ? finish_task_switch+0x1ca/0x820 [ 112.894987] ? syscall_return_slowpath+0x5c0/0x5c0 [ 112.899901] ? syscall_return_slowpath+0x30f/0x5c0 [ 112.904815] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 112.910165] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 112.914997] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 112.920173] RIP: 0033:0x455279 [ 112.923350] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 112.931041] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 112.938292] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 112.945540] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 112.952788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:43 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530b8", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:43 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:43 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653092", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:43 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 1 (fault-call:5 fault-nth:51): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:43 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 112.960038] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000032 [ 112.967691] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd [ 112.977578] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 113.080766] FAULT_INJECTION: forcing a failure. [ 113.080766] name failslab, interval 1, probability 0, space 0, times 0 [ 113.092097] CPU: 1 PID: 10190 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 113.099032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.108389] Call Trace: [ 113.110996] dump_stack+0x1b9/0x294 [ 113.114637] ? dump_stack_print_info.cold.2+0x52/0x52 [ 113.119840] ? perf_trace_lock_acquire+0xe3/0x980 [ 113.124702] should_fail.cold.4+0xa/0x1a [ 113.128775] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 113.133893] ? graph_lock+0x170/0x170 [ 113.137712] ? find_held_lock+0x36/0x1c0 [ 113.141787] ? __lock_is_held+0xb5/0x140 [ 113.145870] ? check_same_owner+0x320/0x320 [ 113.150200] ? rcu_note_context_switch+0x710/0x710 [ 113.155136] ? lock_downgrade+0x8e0/0x8e0 [ 113.159300] __should_failslab+0x124/0x180 [ 113.163557] should_failslab+0x9/0x14 [ 113.167363] kmem_cache_alloc+0x2af/0x760 [ 113.171530] __d_alloc+0xc1/0xc00 [ 113.174999] ? shrink_dcache_for_umount+0x290/0x290 2018/04/12 00:58:43 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:43 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:43 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:44 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 113.180027] ? d_alloc_parallel+0x1e80/0x1e80 [ 113.184531] ? lock_release+0xa10/0xa10 [ 113.188519] ? mark_held_locks+0xc9/0x160 [ 113.192672] ? d_lookup+0x254/0x330 [ 113.196311] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 113.201333] ? d_lookup+0x219/0x330 [ 113.204967] d_alloc+0x8e/0x370 [ 113.208262] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.213802] ? __d_alloc+0xc00/0xc00 [ 113.217523] ? full_name_hash+0xc0/0x100 [ 113.221606] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 113.226893] ? rpc_d_lookup_sb+0x1a0/0x1a0 2018/04/12 00:58:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 113.231149] rpc_populate.constprop.16+0x99/0x390 [ 113.236010] rpc_fill_super+0x3c9/0xbb0 [ 113.240003] ? cap_capable+0x1f9/0x260 [ 113.243902] ? rpc_pipe_release+0xb70/0xb70 [ 113.248242] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.253786] ? security_capable+0x99/0xc0 [ 113.257947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.263493] ? ns_capable_common+0x13f/0x170 [ 113.267913] mount_ns+0x12a/0x1d0 [ 113.271371] ? rpc_pipe_release+0xb70/0xb70 [ 113.275701] rpc_mount+0x9e/0xd0 [ 113.279075] mount_fs+0xae/0x328 [ 113.282451] vfs_kern_mount.part.34+0xd4/0x4d0 [ 113.287047] ? may_umount+0xb0/0xb0 [ 113.290677] ? _raw_read_unlock+0x22/0x30 [ 113.294839] ? __get_fs_type+0x97/0xc0 [ 113.298737] do_mount+0x564/0x3070 [ 113.302287] ? copy_mount_string+0x40/0x40 [ 113.306531] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 113.311564] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 113.316329] ? retint_kernel+0x10/0x10 [ 113.320233] ? copy_mount_options+0x1f0/0x380 [ 113.324728] ? copy_mount_options+0x1fa/0x380 [ 113.329236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.334774] ? copy_mount_options+0x285/0x380 [ 113.339277] ksys_mount+0x12d/0x140 [ 113.342913] SyS_mount+0x35/0x50 [ 113.346281] ? ksys_mount+0x140/0x140 [ 113.350094] do_syscall_64+0x29e/0x9d0 [ 113.353989] ? vmalloc_sync_all+0x30/0x30 [ 113.358143] ? kasan_check_write+0x14/0x20 [ 113.362389] ? syscall_return_slowpath+0x5c0/0x5c0 [ 113.367329] ? syscall_return_slowpath+0x30f/0x5c0 [ 113.372272] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 113.377648] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 113.382501] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 113.387693] RIP: 0033:0x455279 [ 113.390885] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 113.398594] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 113.405850] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 113.413106] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 113.420364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 113.427616] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000033 [ 113.469067] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:44 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:44 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:44 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 1 (fault-call:5 fault-nth:52): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0L', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='//file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 113.682380] FAULT_INJECTION: forcing a failure. [ 113.682380] name failslab, interval 1, probability 0, space 0, times 0 [ 113.693848] CPU: 0 PID: 10232 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 113.700797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.710171] Call Trace: [ 113.712784] dump_stack+0x1b9/0x294 [ 113.716444] ? dump_stack_print_info.cold.2+0x52/0x52 [ 113.721661] should_fail.cold.4+0xa/0x1a [ 113.725726] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 113.730830] ? perf_trace_lock+0x900/0x900 [ 113.735062] ? graph_lock+0x170/0x170 [ 113.738861] ? memset+0x31/0x40 [ 113.742141] ? find_held_lock+0x36/0x1c0 [ 113.746199] ? __lock_is_held+0xb5/0x140 [ 113.750270] ? check_same_owner+0x320/0x320 [ 113.754591] ? rcu_note_context_switch+0x710/0x710 [ 113.759517] __should_failslab+0x124/0x180 [ 113.763747] should_failslab+0x9/0x14 [ 113.767541] kmem_cache_alloc+0x2af/0x760 [ 113.771686] ? rpc_i_callback+0x30/0x30 [ 113.775654] rpc_alloc_inode+0x1a/0x20 [ 113.779534] alloc_inode+0x63/0x190 [ 113.783155] new_inode_pseudo+0x69/0x1a0 [ 113.787207] ? prune_icache_sb+0x1a0/0x1a0 [ 113.791433] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 113.796013] ? kasan_check_write+0x14/0x20 [ 113.800244] ? do_raw_spin_lock+0xc1/0x200 [ 113.804474] new_inode+0x1c/0x40 [ 113.807837] rpc_get_inode+0x1e/0x1f0 [ 113.811627] ? d_drop+0x5a/0x70 [ 113.814899] __rpc_create_common+0x5d/0x190 [ 113.819222] rpc_populate.constprop.16+0x11f/0x390 [ 113.824152] rpc_fill_super+0x3c9/0xbb0 [ 113.828120] ? cap_capable+0x1f9/0x260 [ 113.831998] ? rpc_pipe_release+0xb70/0xb70 [ 113.836321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.841850] ? security_capable+0x99/0xc0 [ 113.845995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.851527] ? ns_capable_common+0x13f/0x170 [ 113.855929] mount_ns+0x12a/0x1d0 [ 113.859373] ? rpc_pipe_release+0xb70/0xb70 [ 113.863688] rpc_mount+0x9e/0xd0 [ 113.867053] mount_fs+0xae/0x328 [ 113.870422] vfs_kern_mount.part.34+0xd4/0x4d0 [ 113.874999] ? may_umount+0xb0/0xb0 [ 113.878621] ? _raw_read_unlock+0x22/0x30 [ 113.882759] ? __get_fs_type+0x97/0xc0 [ 113.886643] do_mount+0x564/0x3070 [ 113.890176] ? do_raw_spin_unlock+0x9e/0x2e0 [ 113.894571] ? interrupt_entry+0xb1/0xf0 [ 113.898624] ? copy_mount_string+0x40/0x40 [ 113.902848] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 113.907598] ? retint_kernel+0x10/0x10 [ 113.911482] ? copy_mount_options+0x1e3/0x380 [ 113.915969] ? audit_kill_trees+0x430/0x430 [ 113.920287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 113.925812] ? copy_mount_options+0x285/0x380 [ 113.930304] ksys_mount+0x12d/0x140 [ 113.933923] SyS_mount+0x35/0x50 [ 113.937284] ? ksys_mount+0x140/0x140 [ 113.941079] do_syscall_64+0x29e/0x9d0 [ 113.944954] ? vmalloc_sync_all+0x30/0x30 [ 113.949091] ? _raw_spin_unlock_irq+0x27/0x70 [ 113.953577] ? finish_task_switch+0x1ca/0x820 [ 113.958065] ? syscall_return_slowpath+0x5c0/0x5c0 [ 113.962986] ? syscall_return_slowpath+0x30f/0x5c0 [ 113.967913] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 113.973275] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 113.978118] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/04/12 00:58:44 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='.0file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 113.983296] RIP: 0033:0x455279 [ 113.986473] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 113.994177] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 114.001435] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 114.008693] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 114.015951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 114.023207] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000034 [ 114.030715] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry nfsd [ 114.040482] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:44 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:44 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:44 executing program 1 (fault-call:5 fault-nth:53): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:44 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./.ile0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 114.212229] FAULT_INJECTION: forcing a failure. [ 114.212229] name failslab, interval 1, probability 0, space 0, times 0 [ 114.223585] CPU: 0 PID: 10260 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 114.230525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.239892] Call Trace: [ 114.242508] dump_stack+0x1b9/0x294 [ 114.246169] ? dump_stack_print_info.cold.2+0x52/0x52 [ 114.251405] should_fail.cold.4+0xa/0x1a [ 114.255491] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 114.260629] ? perf_trace_lock+0x900/0x900 [ 114.264884] ? graph_lock+0x170/0x170 [ 114.268698] ? memset+0x31/0x40 [ 114.272003] ? find_held_lock+0x36/0x1c0 [ 114.276092] ? __lock_is_held+0xb5/0x140 [ 114.280197] ? check_same_owner+0x320/0x320 [ 114.284557] ? rcu_note_context_switch+0x710/0x710 [ 114.289522] __should_failslab+0x124/0x180 [ 114.293780] should_failslab+0x9/0x14 [ 114.297597] kmem_cache_alloc+0x2af/0x760 [ 114.301787] ? rpc_i_callback+0x30/0x30 [ 114.305780] rpc_alloc_inode+0x1a/0x20 2018/04/12 00:58:45 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='.//ile0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 114.309678] alloc_inode+0x63/0x190 [ 114.313326] new_inode_pseudo+0x69/0x1a0 [ 114.317399] ? prune_icache_sb+0x1a0/0x1a0 [ 114.321650] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 114.326260] ? kasan_check_write+0x14/0x20 [ 114.330512] ? do_raw_spin_lock+0xc1/0x200 [ 114.334770] new_inode+0x1c/0x40 [ 114.338155] rpc_get_inode+0x1e/0x1f0 [ 114.341969] ? d_drop+0x5a/0x70 [ 114.345263] __rpc_create_common+0x5d/0x190 [ 114.349585] rpc_populate.constprop.16+0x11f/0x390 [ 114.354514] rpc_fill_super+0x4c1/0xbb0 [ 114.358483] ? cap_capable+0x1f9/0x260 [ 114.362363] ? rpc_pipe_release+0xb70/0xb70 [ 114.366679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.372204] ? security_capable+0x99/0xc0 [ 114.376348] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.381873] ? ns_capable_common+0x13f/0x170 [ 114.386277] mount_ns+0x12a/0x1d0 [ 114.389722] ? rpc_pipe_release+0xb70/0xb70 [ 114.394044] rpc_mount+0x9e/0xd0 [ 114.397407] mount_fs+0xae/0x328 [ 114.400773] vfs_kern_mount.part.34+0xd4/0x4d0 [ 114.405348] ? may_umount+0xb0/0xb0 [ 114.408965] ? _raw_read_unlock+0x22/0x30 [ 114.413113] ? __get_fs_type+0x97/0xc0 [ 114.416998] do_mount+0x564/0x3070 [ 114.420550] ? copy_mount_string+0x40/0x40 [ 114.424773] ? rcu_pm_notify+0xc0/0xc0 [ 114.428664] ? copy_mount_options+0x5f/0x380 [ 114.433061] ? rcu_read_lock_sched_held+0x108/0x120 [ 114.438070] ? kmem_cache_alloc_trace+0x616/0x780 [ 114.442909] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 114.448438] ? _copy_from_user+0xdf/0x150 [ 114.452580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 114.458103] ? copy_mount_options+0x285/0x380 [ 114.462602] ksys_mount+0x12d/0x140 [ 114.466224] SyS_mount+0x35/0x50 [ 114.469581] ? ksys_mount+0x140/0x140 [ 114.473376] do_syscall_64+0x29e/0x9d0 [ 114.477252] ? vmalloc_sync_all+0x30/0x30 [ 114.481390] ? _raw_spin_unlock_irq+0x27/0x70 [ 114.485876] ? finish_task_switch+0x1ca/0x820 [ 114.490366] ? syscall_return_slowpath+0x5c0/0x5c0 [ 114.495289] ? syscall_return_slowpath+0x30f/0x5c0 [ 114.500213] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 114.505587] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 114.510426] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 114.515605] RIP: 0033:0x455279 [ 114.518784] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.526485] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 114.533743] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 114.541002] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 114.548268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 114.555527] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000035 2018/04/12 00:58:45 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 114.563054] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX 2018/04/12 00:58:45 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:45 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530fd", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 114.621906] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/04/12 00:58:45 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file//file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0P', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 1 (fault-call:5 fault-nth:54): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file00file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:45 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:45 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c653081", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 115.064019] FAULT_INJECTION: forcing a failure. [ 115.064019] name failslab, interval 1, probability 0, space 0, times 0 [ 115.075443] CPU: 0 PID: 10325 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 115.082388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.091754] Call Trace: [ 115.094366] dump_stack+0x1b9/0x294 [ 115.098023] ? dump_stack_print_info.cold.2+0x52/0x52 [ 115.103258] should_fail.cold.4+0xa/0x1a [ 115.107350] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 115.112482] ? perf_trace_lock+0x900/0x900 [ 115.116739] ? graph_lock+0x170/0x170 [ 115.120561] ? memset+0x31/0x40 [ 115.123872] ? find_held_lock+0x36/0x1c0 [ 115.127969] ? __lock_is_held+0xb5/0x140 [ 115.132078] ? check_same_owner+0x320/0x320 [ 115.136430] ? rcu_note_context_switch+0x710/0x710 [ 115.141394] __should_failslab+0x124/0x180 [ 115.145651] should_failslab+0x9/0x14 [ 115.149468] kmem_cache_alloc+0x2af/0x760 [ 115.153654] ? rpc_i_callback+0x30/0x30 [ 115.157651] rpc_alloc_inode+0x1a/0x20 [ 115.161555] alloc_inode+0x63/0x190 [ 115.165207] new_inode_pseudo+0x69/0x1a0 [ 115.169289] ? prune_icache_sb+0x1a0/0x1a0 [ 115.173543] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 115.178158] ? kasan_check_write+0x14/0x20 [ 115.182416] ? do_raw_spin_lock+0xc1/0x200 [ 115.186676] new_inode+0x1c/0x40 [ 115.190064] rpc_get_inode+0x1e/0x1f0 [ 115.193881] ? d_drop+0x5a/0x70 [ 115.197191] __rpc_create_common+0x5d/0x190 [ 115.201544] rpc_populate.constprop.16+0x11f/0x390 [ 115.206514] rpc_fill_super+0x3c9/0xbb0 [ 115.210508] ? cap_capable+0x1f9/0x260 [ 115.214418] ? rpc_pipe_release+0xb70/0xb70 [ 115.218764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.224317] ? security_capable+0x99/0xc0 [ 115.228493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.234048] ? ns_capable_common+0x13f/0x170 [ 115.238482] mount_ns+0x12a/0x1d0 [ 115.241951] ? rpc_pipe_release+0xb70/0xb70 [ 115.246297] rpc_mount+0x9e/0xd0 [ 115.249686] mount_fs+0xae/0x328 [ 115.253084] vfs_kern_mount.part.34+0xd4/0x4d0 [ 115.257692] ? may_umount+0xb0/0xb0 [ 115.261333] ? _raw_read_unlock+0x22/0x30 [ 115.265498] ? __get_fs_type+0x97/0xc0 [ 115.269413] do_mount+0x564/0x3070 [ 115.272968] ? do_raw_spin_unlock+0x9e/0x2e0 [ 115.277402] ? copy_mount_string+0x40/0x40 [ 115.281653] ? rcu_pm_notify+0xc0/0xc0 [ 115.285574] ? copy_mount_options+0x5f/0x380 [ 115.289998] ? rcu_read_lock_sched_held+0x108/0x120 [ 115.295033] ? kmem_cache_alloc_trace+0x616/0x780 [ 115.299900] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 115.305460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.311011] ? copy_mount_options+0x285/0x380 [ 115.315532] ksys_mount+0x12d/0x140 [ 115.319210] SyS_mount+0x35/0x50 [ 115.322590] ? ksys_mount+0x140/0x140 [ 115.326415] do_syscall_64+0x29e/0x9d0 [ 115.330324] ? vmalloc_sync_all+0x30/0x30 [ 115.334487] ? _raw_spin_unlock_irq+0x27/0x70 [ 115.339006] ? finish_task_switch+0x1ca/0x820 [ 115.343520] ? syscall_return_slowpath+0x5c0/0x5c0 [ 115.348471] ? syscall_return_slowpath+0x30f/0x5c0 [ 115.353428] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 115.358821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 115.363692] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 115.368900] RIP: 0033:0x455279 [ 115.372102] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 115.379835] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 115.387120] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 115.394404] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 115.401691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 2018/04/12 00:58:45 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:45 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0//ile0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 115.408974] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000036 [ 115.416400] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd 2018/04/12 00:58:46 executing program 1 (fault-call:5 fault-nth:55): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:46 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/.ile0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:46 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530f4", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 115.565915] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / 2018/04/12 00:58:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 115.722717] FAULT_INJECTION: forcing a failure. [ 115.722717] name failslab, interval 1, probability 0, space 0, times 0 [ 115.734148] CPU: 1 PID: 10403 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 115.741085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.750444] Call Trace: [ 115.753052] dump_stack+0x1b9/0x294 [ 115.756702] ? dump_stack_print_info.cold.2+0x52/0x52 [ 115.761905] ? perf_trace_lock_acquire+0xe3/0x980 [ 115.766775] should_fail.cold.4+0xa/0x1a [ 115.770856] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 115.775978] ? graph_lock+0x170/0x170 [ 115.779795] ? find_held_lock+0x36/0x1c0 [ 115.783873] ? __lock_is_held+0xb5/0x140 [ 115.787958] ? check_same_owner+0x320/0x320 [ 115.792293] ? rcu_note_context_switch+0x710/0x710 [ 115.797229] ? lock_downgrade+0x8e0/0x8e0 [ 115.801395] __should_failslab+0x124/0x180 [ 115.805648] should_failslab+0x9/0x14 [ 115.809460] kmem_cache_alloc+0x2af/0x760 [ 115.813631] __d_alloc+0xc1/0xc00 [ 115.817100] ? shrink_dcache_for_umount+0x290/0x290 2018/04/12 00:58:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 115.822127] ? d_alloc_parallel+0x1e80/0x1e80 [ 115.826641] ? lock_release+0xa10/0xa10 [ 115.830633] ? do_raw_spin_lock+0xc1/0x200 [ 115.834879] ? mark_held_locks+0xc9/0x160 [ 115.839043] ? d_lookup+0x254/0x330 [ 115.842686] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 115.847713] ? d_lookup+0x219/0x330 [ 115.851350] d_alloc+0x8e/0x370 [ 115.854646] ? __d_alloc+0xc00/0xc00 [ 115.858369] ? full_name_hash+0xc0/0x100 [ 115.862453] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 115.867741] ? down_write+0x87/0x120 [ 115.871465] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 115.875710] ? down_read+0x1b0/0x1b0 [ 115.879449] ? __d_lookup+0x9c0/0x9c0 [ 115.883266] rpc_populate.constprop.16+0x99/0x390 [ 115.888127] rpc_fill_super+0x6ae/0xbb0 [ 115.892117] ? rpc_pipe_release+0xb70/0xb70 [ 115.896452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.901998] ? security_capable+0x99/0xc0 [ 115.906160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.911699] ? ns_capable_common+0x13f/0x170 [ 115.916114] mount_ns+0x12a/0x1d0 [ 115.919571] ? rpc_pipe_release+0xb70/0xb70 [ 115.923905] rpc_mount+0x9e/0xd0 [ 115.927280] mount_fs+0xae/0x328 [ 115.930660] vfs_kern_mount.part.34+0xd4/0x4d0 [ 115.935257] ? may_umount+0xb0/0xb0 [ 115.938890] ? _raw_read_unlock+0x22/0x30 [ 115.943047] ? __get_fs_type+0x97/0xc0 [ 115.946941] do_mount+0x564/0x3070 [ 115.950491] ? copy_mount_string+0x40/0x40 [ 115.954732] ? rcu_pm_notify+0xc0/0xc0 [ 115.958629] ? copy_mount_options+0x5f/0x380 [ 115.963036] ? rcu_read_lock_sched_held+0x108/0x120 [ 115.968059] ? kmem_cache_alloc_trace+0x616/0x780 [ 115.972911] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 115.978454] ? _copy_from_user+0xdf/0x150 [ 115.982618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 115.988158] ? copy_mount_options+0x285/0x380 [ 115.992653] ksys_mount+0x12d/0x140 [ 115.996284] SyS_mount+0x35/0x50 [ 115.999653] ? ksys_mount+0x140/0x140 [ 116.003464] do_syscall_64+0x29e/0x9d0 [ 116.007359] ? vmalloc_sync_all+0x30/0x30 [ 116.011510] ? _raw_spin_unlock_irq+0x27/0x70 [ 116.016014] ? finish_task_switch+0x1ca/0x820 [ 116.020520] ? syscall_return_slowpath+0x5c0/0x5c0 [ 116.025450] ? syscall_return_slowpath+0x30f/0x5c0 [ 116.030371] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 116.035728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.040565] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 116.045741] RIP: 0033:0x455279 [ 116.048913] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.056608] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 116.063860] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 116.071112] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 116.078362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 116.085616] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000037 [ 116.093164] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/04/12 00:58:46 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file/\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:46 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0c', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:46 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:46 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:46 executing program 1 (fault-call:5 fault-nth:56): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 116.223711] FAULT_INJECTION: forcing a failure. [ 116.223711] name failslab, interval 1, probability 0, space 0, times 0 [ 116.235141] CPU: 1 PID: 10423 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 116.242093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.251456] Call Trace: [ 116.254072] dump_stack+0x1b9/0x294 [ 116.257728] ? dump_stack_print_info.cold.2+0x52/0x52 [ 116.263106] ? perf_trace_lock_acquire+0xe3/0x980 [ 116.267960] ? graph_lock+0x170/0x170 [ 116.271788] should_fail.cold.4+0xa/0x1a [ 116.276132] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 116.281256] ? perf_trace_lock+0x900/0x900 [ 116.285505] ? graph_lock+0x170/0x170 [ 116.289329] ? graph_lock+0x170/0x170 [ 116.293154] ? find_held_lock+0x36/0x1c0 [ 116.297229] ? __lock_is_held+0xb5/0x140 [ 116.301312] ? check_same_owner+0x320/0x320 [ 116.305644] ? rcu_note_context_switch+0x710/0x710 [ 116.310596] __should_failslab+0x124/0x180 [ 116.314841] should_failslab+0x9/0x14 [ 116.318654] kmem_cache_alloc+0x2af/0x760 [ 116.322818] ? rpc_i_callback+0x30/0x30 [ 116.326803] rpc_alloc_inode+0x1a/0x20 [ 116.330696] alloc_inode+0x63/0x190 [ 116.334331] new_inode_pseudo+0x69/0x1a0 [ 116.338401] ? prune_icache_sb+0x1a0/0x1a0 [ 116.342643] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 116.347236] ? kasan_check_write+0x14/0x20 [ 116.351479] ? do_raw_spin_lock+0xc1/0x200 [ 116.355722] new_inode+0x1c/0x40 [ 116.359100] rpc_get_inode+0x1e/0x1f0 [ 116.362908] ? d_drop+0x5a/0x70 [ 116.366200] __rpc_create_common+0x5d/0x190 [ 116.370533] rpc_populate.constprop.16+0x11f/0x390 [ 116.375482] rpc_fill_super+0x4c1/0xbb0 [ 116.379468] ? cap_capable+0x1f9/0x260 [ 116.383363] ? rpc_pipe_release+0xb70/0xb70 [ 116.387698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.393244] ? security_capable+0x99/0xc0 [ 116.397407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.402944] ? ns_capable_common+0x13f/0x170 [ 116.407360] mount_ns+0x12a/0x1d0 [ 116.410818] ? rpc_pipe_release+0xb70/0xb70 [ 116.415154] rpc_mount+0x9e/0xd0 [ 116.418614] mount_fs+0xae/0x328 2018/04/12 00:58:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:47 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530f6", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530ff", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 116.421997] vfs_kern_mount.part.34+0xd4/0x4d0 [ 116.426592] ? may_umount+0xb0/0xb0 [ 116.430236] ? _raw_read_unlock+0x22/0x30 [ 116.434396] ? __get_fs_type+0x97/0xc0 [ 116.438295] do_mount+0x564/0x3070 [ 116.441854] ? do_raw_spin_unlock+0x9e/0x2e0 [ 116.446270] ? copy_mount_string+0x40/0x40 [ 116.450512] ? rcu_pm_notify+0xc0/0xc0 [ 116.454412] ? copy_mount_options+0x5f/0x380 [ 116.458831] ? rcu_read_lock_sched_held+0x108/0x120 [ 116.463862] ? kmem_cache_alloc_trace+0x616/0x780 [ 116.468722] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 116.474277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 116.479820] ? copy_mount_options+0x285/0x380 [ 116.484323] ksys_mount+0x12d/0x140 [ 116.487962] SyS_mount+0x35/0x50 [ 116.491330] ? ksys_mount+0x140/0x140 [ 116.495142] do_syscall_64+0x29e/0x9d0 [ 116.499036] ? vmalloc_sync_all+0x30/0x30 [ 116.503189] ? _raw_spin_unlock_irq+0x27/0x70 [ 116.507691] ? finish_task_switch+0x1ca/0x820 [ 116.512193] ? syscall_return_slowpath+0x5c0/0x5c0 [ 116.517133] ? syscall_return_slowpath+0x30f/0x5c0 [ 116.522071] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 116.527447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.532306] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 116.537500] RIP: 0033:0x455279 [ 116.540691] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.548407] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 116.555682] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 116.562950] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 116.570206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 116.577462] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000038 [ 116.584869] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry clntXX 2018/04/12 00:58:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 116.619616] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory gssd 2018/04/12 00:58:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0`', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 1 (fault-call:5 fault-nth:57): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:47 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:47 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)="2e2f66696c65302f66696c6530f6", &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) [ 116.852155] FAULT_INJECTION: forcing a failure. [ 116.852155] name failslab, interval 1, probability 0, space 0, times 0 [ 116.863521] CPU: 1 PID: 10486 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 116.870461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.879819] Call Trace: [ 116.882423] dump_stack+0x1b9/0x294 [ 116.886070] ? dump_stack_print_info.cold.2+0x52/0x52 [ 116.891268] ? perf_trace_lock_acquire+0xe3/0x980 [ 116.896134] should_fail.cold.4+0xa/0x1a 2018/04/12 00:58:47 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:47 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 116.900212] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 116.905331] ? graph_lock+0x170/0x170 [ 116.909141] ? find_held_lock+0x36/0x1c0 [ 116.913212] ? __lock_is_held+0xb5/0x140 [ 116.917292] ? check_same_owner+0x320/0x320 [ 116.921622] ? rcu_note_context_switch+0x710/0x710 [ 116.926560] ? lock_downgrade+0x8e0/0x8e0 [ 116.930722] __should_failslab+0x124/0x180 [ 116.934963] should_failslab+0x9/0x14 [ 116.938822] kmem_cache_alloc+0x2af/0x760 [ 116.942989] __d_alloc+0xc1/0xc00 [ 116.946464] ? shrink_dcache_for_umount+0x290/0x290 2018/04/12 00:58:47 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) [ 116.951493] ? d_alloc_parallel+0x1e80/0x1e80 [ 116.956005] ? lock_release+0xa10/0xa10 [ 116.960075] ? do_raw_spin_lock+0xc1/0x200 [ 116.964321] ? mark_held_locks+0xc9/0x160 [ 116.968480] ? d_lookup+0x254/0x330 [ 116.972130] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 116.977153] ? d_lookup+0x219/0x330 [ 116.980794] d_alloc+0x8e/0x370 [ 116.984078] ? __d_alloc+0xc00/0xc00 [ 116.987804] ? full_name_hash+0xc0/0x100 [ 116.991879] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 116.997152] ? down_write+0x87/0x120 [ 117.000857] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 117.005106] ? down_read+0x1b0/0x1b0 [ 117.008813] ? __d_lookup+0x9c0/0x9c0 [ 117.012606] rpc_populate.constprop.16+0x99/0x390 [ 117.017440] rpc_fill_super+0x6ae/0xbb0 [ 117.021402] ? rpc_pipe_release+0xb70/0xb70 [ 117.025716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.031238] ? security_capable+0x99/0xc0 [ 117.035377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.040899] ? ns_capable_common+0x13f/0x170 [ 117.045293] mount_ns+0x12a/0x1d0 [ 117.048734] ? rpc_pipe_release+0xb70/0xb70 [ 117.053048] rpc_mount+0x9e/0xd0 [ 117.056399] mount_fs+0xae/0x328 [ 117.059755] vfs_kern_mount.part.34+0xd4/0x4d0 [ 117.064323] ? may_umount+0xb0/0xb0 [ 117.067935] ? _raw_read_unlock+0x22/0x30 [ 117.072069] ? __get_fs_type+0x97/0xc0 [ 117.075947] do_mount+0x564/0x3070 [ 117.079473] ? do_raw_spin_unlock+0x9e/0x2e0 [ 117.083871] ? copy_mount_string+0x40/0x40 [ 117.088092] ? rcu_pm_notify+0xc0/0xc0 [ 117.091970] ? copy_mount_options+0x5f/0x380 [ 117.096362] ? rcu_read_lock_sched_held+0x108/0x120 [ 117.101363] ? kmem_cache_alloc_trace+0x616/0x780 [ 117.106191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.111717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.117238] ? copy_mount_options+0x285/0x380 [ 117.121727] ksys_mount+0x12d/0x140 [ 117.125339] SyS_mount+0x35/0x50 [ 117.128687] ? ksys_mount+0x140/0x140 [ 117.132472] do_syscall_64+0x29e/0x9d0 [ 117.136342] ? vmalloc_sync_all+0x30/0x30 [ 117.140474] ? _raw_spin_unlock_irq+0x27/0x70 [ 117.144954] ? finish_task_switch+0x1ca/0x820 [ 117.149433] ? syscall_return_slowpath+0x5c0/0x5c0 [ 117.154346] ? syscall_return_slowpath+0x30f/0x5c0 [ 117.159263] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 117.164613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.169444] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 117.174614] RIP: 0033:0x455279 [ 117.177791] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.185484] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 117.192739] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 117.200000] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 117.207259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 117.214515] R13: 00000000000003fb R14: 00000000006f9028 R15: 0000000000000039 [ 117.222200] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory clntXX 2018/04/12 00:58:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:48 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\n', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:48 executing program 2: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:48 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:48 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:48 executing program 6: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) r0 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x7fffffff, 0x7, 0x0, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:48 executing program 4: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/04/12 00:58:48 executing program 7: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x0, 0x5, 0x0, 0x1ff, 0x0, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x0, 0x20001, 0x5, 0x0, 0x9, 0x0, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x0, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) r6 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x10401, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r6, 0xc0106403, &(0x7f0000000140)={0xfffffffffffffc00, 0x8, 0x6, 0x4}) fallocate(r6, 0x1, 0xfffffffffffffffe, 0x4) 2018/04/12 00:58:48 executing program 1 (fault-call:5 fault-nth:58): perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:48 executing program 0: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/04/12 00:58:48 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000091dff8)="2e2f66696c6530f5", &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 117.639864] FAULT_INJECTION: forcing a failure. [ 117.639864] name failslab, interval 1, probability 0, space 0, times 0 [ 117.651377] CPU: 0 PID: 10549 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 117.658315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.667684] Call Trace: [ 117.670302] dump_stack+0x1b9/0x294 [ 117.673949] ? dump_stack_print_info.cold.2+0x52/0x52 [ 117.679148] ? perf_tp_event+0xc30/0xc30 [ 117.683217] should_fail.cold.4+0xa/0x1a [ 117.687280] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 117.692398] ? graph_lock+0x170/0x170 [ 117.696203] ? find_held_lock+0x36/0x1c0 [ 117.700348] ? __lock_is_held+0xb5/0x140 [ 117.704416] ? check_same_owner+0x320/0x320 [ 117.708736] ? rcu_note_context_switch+0x710/0x710 [ 117.713656] ? lock_downgrade+0x8e0/0x8e0 [ 117.717804] __should_failslab+0x124/0x180 [ 117.722040] should_failslab+0x9/0x14 [ 117.725829] kmem_cache_alloc+0x2af/0x760 [ 117.729983] __d_alloc+0xc1/0xc00 [ 117.733435] ? shrink_dcache_for_umount+0x290/0x290 [ 117.738446] ? d_alloc_parallel+0x1e80/0x1e80 [ 117.742936] ? lock_release+0xa10/0xa10 [ 117.746909] ? mark_held_locks+0xc9/0x160 [ 117.751049] ? d_lookup+0x254/0x330 [ 117.754672] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 117.759676] ? d_lookup+0x219/0x330 [ 117.763297] d_alloc+0x8e/0x370 [ 117.766569] ? __d_alloc+0xc00/0xc00 [ 117.770273] ? full_name_hash+0xc0/0x100 [ 117.774336] __rpc_lookup_create_exclusive+0x18b/0x1e0 [ 117.779601] ? down_write_nested+0x8b/0x120 [ 117.783913] ? rpc_d_lookup_sb+0x1a0/0x1a0 [ 117.788136] ? _down_write_nest_lock+0x120/0x120 [ 117.792881] ? rpc_d_lookup_sb+0x115/0x1a0 [ 117.797119] rpc_mkpipe_dentry+0xf6/0x3a0 [ 117.801265] nfs4blocklayout_register_sb+0x4b/0x70 [ 117.806196] rpc_pipefs_event+0x38d/0x570 [ 117.810336] ? bl_pipe_downcall+0x490/0x490 [ 117.814651] ? rcu_note_context_switch+0x710/0x710 [ 117.819579] notifier_call_chain+0x178/0x380 [ 117.823984] ? unregister_die_notifier+0x20/0x20 [ 117.828736] ? rcu_bh_force_quiescent_state+0x20/0x20 [ 117.833920] ? _raw_spin_unlock+0x22/0x30 [ 117.838069] blocking_notifier_call_chain+0x139/0x170 [ 117.843252] ? srcu_init_notifier_head+0xa0/0xa0 [ 117.848107] rpc_fill_super+0x5a0/0xbb0 [ 117.852077] ? rpc_pipe_release+0xb70/0xb70 [ 117.856392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.861918] ? security_capable+0x99/0xc0 [ 117.866062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.871589] ? ns_capable_common+0x13f/0x170 [ 117.875994] mount_ns+0x12a/0x1d0 [ 117.879442] ? rpc_pipe_release+0xb70/0xb70 [ 117.883758] rpc_mount+0x9e/0xd0 [ 117.887115] mount_fs+0xae/0x328 [ 117.890483] vfs_kern_mount.part.34+0xd4/0x4d0 [ 117.895063] ? may_umount+0xb0/0xb0 [ 117.898678] ? _raw_read_unlock+0x22/0x30 [ 117.902818] ? __get_fs_type+0x97/0xc0 [ 117.906701] do_mount+0x564/0x3070 [ 117.910241] ? copy_mount_string+0x40/0x40 [ 117.914464] ? rcu_pm_notify+0xc0/0xc0 [ 117.918352] ? copy_mount_options+0x5f/0x380 [ 117.922751] ? rcu_read_lock_sched_held+0x108/0x120 [ 117.927761] ? kmem_cache_alloc_trace+0x616/0x780 [ 117.932599] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 117.938126] ? _copy_from_user+0xdf/0x150 [ 117.942270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 117.947798] ? copy_mount_options+0x285/0x380 [ 117.952290] ksys_mount+0x12d/0x140 [ 117.955908] SyS_mount+0x35/0x50 [ 117.959267] ? ksys_mount+0x140/0x140 [ 117.963064] do_syscall_64+0x29e/0x9d0 [ 117.966944] ? vmalloc_sync_all+0x30/0x30 [ 117.971080] ? _raw_spin_unlock_irq+0x27/0x70 [ 117.975568] ? finish_task_switch+0x1ca/0x820 [ 117.980057] ? syscall_return_slowpath+0x5c0/0x5c0 [ 117.984977] ? syscall_return_slowpath+0x30f/0x5c0 [ 117.989903] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 117.995273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.000115] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 118.005291] RIP: 0033:0x455279 [ 118.008467] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 118.016168] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 118.023423] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 118.030684] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 118.037944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 118.045203] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000003a [ 118.074752] list_del corruption. prev->next should be 0000000075c9da7a, but was 00000000eaec337b [ 118.084727] ------------[ cut here ]------------ [ 118.089500] kernel BUG at lib/list_debug.c:53! [ 118.094170] invalid opcode: 0000 [#1] SMP KASAN [ 118.098845] Dumping ftrace buffer: [ 118.102393] (ftrace buffer empty) [ 118.106106] Modules linked in: [ 118.109321] CPU: 0 PID: 10549 Comm: syz-executor1 Not tainted 4.16.0+ #17 [ 118.116252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.125624] RIP: 0010:__list_del_entry_valid.cold.1+0x48/0x58 [ 118.131513] RSP: 0018:ffff880186a87700 EFLAGS: 00010282 [ 118.136888] RAX: 0000000000000054 RBX: ffff88018894bb10 RCX: 0000000000000000 [ 118.144169] RDX: 0000000000000054 RSI: ffffffff815fbf41 RDI: ffffed0030d50ed6 [ 118.151450] RBP: ffff880186a87718 R08: ffff88018b278140 R09: ffffed003b604f90 [ 118.158736] R10: ffffed003b604f90 R11: ffff8801db027c87 R12: ffff88018b523520 [ 118.166026] R13: ffff88018894b9b0 R14: ffff880186a877f0 R15: dffffc0000000000 [ 118.173306] FS: 00007f84195fc700(0000) GS:ffff8801db000000(0000) knlGS:0000000000000000 [ 118.181532] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.187402] CR2: 0000001b9bc25000 CR3: 00000001b1dc1000 CR4: 00000000001406f0 [ 118.194755] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 118.202027] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 118.209291] Call Trace: [ 118.211876] __dentry_kill+0x29e/0x770 [ 118.215770] ? check_and_drop+0x1b0/0x1b0 [ 118.219920] ? do_raw_spin_lock+0x200/0x200 [ 118.224236] ? kasan_check_read+0x11/0x20 [ 118.228633] ? rcu_is_watching+0x85/0x140 [ 118.232778] dentry_kill+0xc9/0x5a0 [ 118.236402] dput.part.26+0x648/0x7b0 [ 118.240197] ? shrink_dcache_sb+0x350/0x350 [ 118.244509] ? rpc_show_info+0x4c0/0x4c0 [ 118.248567] dput+0x1f/0x30 [ 118.251487] rpc_fill_super+0x882/0xbb0 [ 118.255459] ? rpc_pipe_release+0xb70/0xb70 [ 118.259776] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.265303] ? security_capable+0x99/0xc0 [ 118.269444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.274973] ? ns_capable_common+0x13f/0x170 [ 118.279383] mount_ns+0x12a/0x1d0 [ 118.282827] ? rpc_pipe_release+0xb70/0xb70 [ 118.287140] rpc_mount+0x9e/0xd0 [ 118.290496] mount_fs+0xae/0x328 [ 118.293856] vfs_kern_mount.part.34+0xd4/0x4d0 [ 118.298431] ? may_umount+0xb0/0xb0 [ 118.302049] ? _raw_read_unlock+0x22/0x30 [ 118.306187] ? __get_fs_type+0x97/0xc0 [ 118.310069] do_mount+0x564/0x3070 [ 118.313604] ? copy_mount_string+0x40/0x40 [ 118.317827] ? rcu_pm_notify+0xc0/0xc0 [ 118.321717] ? copy_mount_options+0x5f/0x380 [ 118.326116] ? rcu_read_lock_sched_held+0x108/0x120 [ 118.331122] ? kmem_cache_alloc_trace+0x616/0x780 [ 118.335959] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 118.341485] ? _copy_from_user+0xdf/0x150 [ 118.345625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 118.351148] ? copy_mount_options+0x285/0x380 [ 118.355635] ksys_mount+0x12d/0x140 [ 118.359254] SyS_mount+0x35/0x50 [ 118.362606] ? ksys_mount+0x140/0x140 [ 118.366400] do_syscall_64+0x29e/0x9d0 [ 118.370276] ? vmalloc_sync_all+0x30/0x30 [ 118.374419] ? _raw_spin_unlock_irq+0x27/0x70 [ 118.378906] ? finish_task_switch+0x1ca/0x820 [ 118.383395] ? syscall_return_slowpath+0x5c0/0x5c0 [ 118.388317] ? syscall_return_slowpath+0x30f/0x5c0 [ 118.393239] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 118.398595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.403433] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 118.408607] RIP: 0033:0x455279 [ 118.411786] RSP: 002b:00007f84195fbc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 118.419485] RAX: ffffffffffffffda RBX: 00007f84195fc6d4 RCX: 0000000000455279 [ 118.426744] RDX: 0000000020000100 RSI: 0000000020000080 RDI: 0000000020000040 [ 118.434002] RBP: 000000000072bea0 R08: 0000000020000300 R09: 0000000000000000 [ 118.441264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 118.448519] R13: 00000000000003fb R14: 00000000006f9028 R15: 000000000000003a [ 118.455790] Code: 00 85 d8 87 e8 a6 66 28 fe 0f 0b 48 89 de 48 c7 c7 20 86 d8 87 e8 95 66 28 fe 0f 0b 48 89 de 48 c7 c7 c0 85 d8 87 e8 84 66 28 fe <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 55 48 89 e5 41 [ 118.475205] RIP: __list_del_entry_valid.cold.1+0x48/0x58 RSP: ffff880186a87700 [ 118.482692] ---[ end trace 24b1942adf3af7cf ]--- [ 118.487485] Kernel panic - not syncing: Fatal exception [ 118.493317] Dumping ftrace buffer: [ 118.496849] (ftrace buffer empty) [ 118.500558] Kernel Offset: disabled [ 118.504171] Rebooting in 86400 seconds..