7781230799f3e99e6eb91f1c5237fad0664c23d0b5576182fbbf5bb62bac3825dfb919b8c6cd2e2bb739fa411910031c16b4175d0c637a6a38bb5f1987afccb126604fdefca8662dc3923e9d79154f13236f73a79649ada0cc92fe43b13bdd9e5a0b556d57122e904c08bab70297a9c7ec77b0d7c8c807d9d794c28a38605"}, {0x70, 0x1, 0x8001, "ec5871a1e309d772b3cc1def9084379194bd8cc1d0e1afd466a00fb90b8be7581d03682310ab4dfd588a0181e7cf103071f65d255ebd0de3e46d15786d5f758c3eba691d5faa36f9423067e7ae82e72d4a27750016d82d1d5b65d8da8f51199f"}, {0x100, 0x0, 0x7, "c8a48e681cab1a94a1d654e899235aee0f0ef71fa81ef58f89196407ba51b0d4fe5e61f77d00e8f5821f3f93ea3593c2cf16f6042c82edabdf9f8d5ef398e698b5b088cd5d78316532efc5fe10ea3d622417b4ea3af6a1f58bd0ad42f9176596c7a73745e452ae2ea33199d510ef7861524b95600ef75691e8605b4663765150d048f62403668d7c2faab5835ff433ef97b3c02f5c1bbc44fcc74e7f506da506678e6664cd489a688418985ccf253011f2e10e8e54c84c6e6e72d584fecba762184a6fb89c1b89cce6f15ff4b53fbb4ac457b4dab9064541376a6ba24cf3595f51bd0c869b00a092e9"}, {0x30, 0x11f, 0x3, "02c6028acf6717b60095b7ca1699d3fbe39d383d2eacfa6b9bc193b7c35e95"}], 0x280, 0x40000}, 0x40800) [ 624.894831] FAULT_INJECTION: forcing a failure. [ 624.894831] name failslab, interval 1, probability 0, space 0, times 0 [ 624.906148] CPU: 1 PID: 301 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 624.913251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.922949] Call Trace: [ 624.925540] dump_stack+0x194/0x24d [ 624.929191] ? arch_local_irq_restore+0x53/0x53 [ 624.933883] ? wait_for_completion+0x770/0x770 [ 624.938521] should_fail+0x8c0/0xa40 2018/03/29 12:28:34 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x409, &(0x7f00000017c0), 0x0, &(0x7f0000000580)=ANY=[], 0x0, 0x24004044}, 0x4007ffe) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000001580)={&(0x7f0000000b40)=@hci={0x0, 0x0}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000d00)=""/50, 0x32}, {&(0x7f0000000d40)=""/209, 0xd1}, {&(0x7f0000000e40)=""/199, 0xc7}, {&(0x7f0000000f40)=""/11, 0xb}, {&(0x7f0000000f80)=""/220, 0xdc}, {&(0x7f0000001080)=""/136, 0x88}, {&(0x7f0000001140)=""/156, 0x9c}, {&(0x7f0000001200)=""/119, 0x77}, {&(0x7f0000001280)=""/193, 0xc1}, {&(0x7f0000001380)=""/19, 0x13}], 0xa, &(0x7f0000001480)=""/230, 0xe6, 0x5}, 0x2) sendmsg(r4, &(0x7f00000019c0)={&(0x7f00000015c0)=@hci={0x1f, r6}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001640)="2091cce638946f4db97b215486d61fa832379b6260132d3ee1496e0afea253c5dae07c8f9e567d335dced7d2fce6ef5d03e25cf1bad3cb39268ff1b4f5edd882a9a0130839d3df57962cf7d278f8f297cd74b5b79e72e3fff847e7bb1d14057e878a505c694402db9e93c572aca1b6c3a1a25a8b51041f6b7dea4d76d90f3f5934093ad795d131a318002ed55c94bfcf351fd6bf6f2ca9fbdc90b5d3cdb2ae2a5de7b73efc2a8f206ed4564d57dae9dc63b54f26093c7a02b94a8a2b638fd4a04eb9af0b4a24f279a2475b89fbeba4b6bc5db0db6b576d1c268f", 0xda}, {&(0x7f0000001740)="01187f1db9169cb0ce92b5b31d83ea9c26850428fd9d7131f69a1f6e5fadd25de5d129ea891ee482ee96f2eac37e93", 0x2f}, {&(0x7f0000001780)="c2c51d5d3642ff3e88bb9cde581dedb288d17098a2dce49f7867d970d48acf05ff9a3ca4e5bee39af6a00df15e21e3", 0x2f}], 0x3, &(0x7f0000001800)=[{0xe8, 0x6, 0x8, "f642a2dbb436e1e59e67ac738347eef60a080e4554850d9fea70134afbcddb83a163d3e2e53847b132b2e9bd4231cc9cd8df875f99c66ba67b29ac7c74ab9dfd123679b60065fa41524010d2a61dac3805f8d0a66080ef925eae9c0b05e919f4e19d5d3a241e82d1b32f27bc8918c41f8a66d8bb9949cf9d0e63b064d1eebb7c3a96f05a3a0b61cec9d558153b3dc6850350457aabfb4753f45dd88542fc9726127fcd1877a1712f9910e15e4efca5e86069e09b95c4c8f9c25436eeebf750f3b8901a2af4d89636cd1637d881f61a9f7df4707c"}, {0x38, 0x108, 0x400, "1e0cf6bbd90340d9d7174ba1327156e828d53a33e0bdf3d7376244af999a8d235f3c8c694ce2b484"}, {0x90, 0xff, 0x8, "f2608512f3b41fbc062f3393ac18b73caf852a63cc2aa4b5d1210c76ab0ffb1a64ead1dde0878c0c8b122e795c99affff9a7b65a5b7fb5c9aa5e859e374777d724a2282daced3e7ceaf254190b79fc04cf31efa31e5973875fd26353a977cd19ec29841958392301583d7f8326ce1aa0bd1e2b4a673bff923eb1be3cb6"}], 0x1b0, 0x4000000}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 624.942244] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 624.947351] ? rcu_pm_notify+0xc0/0xc0 [ 624.951256] ? find_held_lock+0x35/0x1d0 [ 624.955325] ? check_same_owner+0x320/0x320 [ 624.959624] ? sget_userns+0x27d/0xe40 [ 624.963522] ? rcu_note_context_switch+0x710/0x710 [ 624.968448] should_failslab+0xec/0x120 [ 624.972413] kmem_cache_alloc_trace+0x4b/0x740 [ 624.976987] ? security_capable+0x8e/0xc0 [ 624.981136] sget_userns+0x2a3/0xe40 [ 624.984835] ? set_anon_super+0x20/0x20 [ 624.988803] ? put_filp+0x90/0x90 [ 624.992253] ? destroy_unused_super.part.6+0xd0/0xd0 [ 624.997352] ? alloc_vfsmnt+0x762/0x9c0 [ 625.001309] ? path_lookupat+0x238/0xba0 [ 625.005349] ? mnt_free_id.isra.21+0x50/0x50 [ 625.009744] ? trace_hardirqs_off+0x10/0x10 [ 625.014057] ? putname+0xee/0x130 [ 625.017517] ? cap_capable+0x1b5/0x230 [ 625.021399] ? security_capable+0x8e/0xc0 [ 625.025530] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 625.030702] ? ns_capable_common+0xcf/0x160 [ 625.035018] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 625.040215] mount_ns+0x6d/0x190 [ 625.043569] rpc_mount+0x9e/0xd0 [ 625.046917] mount_fs+0x66/0x2d0 [ 625.050267] vfs_kern_mount.part.26+0xc6/0x4a0 [ 625.054833] ? may_umount+0xa0/0xa0 [ 625.058453] ? _raw_read_unlock+0x22/0x30 [ 625.062590] ? __get_fs_type+0x8a/0xc0 [ 625.066464] do_mount+0xea4/0x2bb0 [ 625.069981] ? __might_fault+0x110/0x1d0 [ 625.074045] ? copy_mount_string+0x40/0x40 [ 625.078276] ? check_same_owner+0x320/0x320 [ 625.082595] ? __check_object_size+0x8b/0x530 [ 625.087099] ? __might_sleep+0x95/0x190 [ 625.091080] ? kasan_check_write+0x14/0x20 [ 625.095302] ? _copy_from_user+0x99/0x110 [ 625.099431] ? memdup_user+0x5e/0x90 [ 625.103127] ? copy_mount_options+0x1f7/0x2e0 [ 625.107604] SyS_mount+0xab/0x120 [ 625.111050] ? copy_mnt_ns+0xb30/0xb30 [ 625.114937] do_syscall_64+0x281/0x940 [ 625.118812] ? __do_page_fault+0xc90/0xc90 [ 625.123033] ? _raw_spin_unlock_irq+0x27/0x70 [ 625.127527] ? finish_task_switch+0x1c1/0x7e0 [ 625.132013] ? syscall_return_slowpath+0x550/0x550 [ 625.136933] ? syscall_return_slowpath+0x2ac/0x550 [ 625.141841] ? prepare_exit_to_usermode+0x350/0x350 [ 625.146851] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 625.152196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 625.157031] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 625.162216] RIP: 0033:0x4548b9 [ 625.165395] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 625.173086] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 625.180336] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 625.187591] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 12:28:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:34 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:34 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:34 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[]}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:34 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 625.194846] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 625.202093] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/29 12:28:34 executing program 1 (fault-call:11 fault-nth:7): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:34 executing program 5 (fault-call:12 fault-nth:0): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:34 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:34 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 625.309703] FAULT_INJECTION: forcing a failure. [ 625.309703] name failslab, interval 1, probability 0, space 0, times 0 [ 625.321072] CPU: 0 PID: 324 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 625.328174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.337524] Call Trace: [ 625.340107] dump_stack+0x194/0x24d [ 625.343725] ? arch_local_irq_restore+0x53/0x53 [ 625.348400] ? kernel_text_address+0x102/0x140 [ 625.352994] should_fail+0x8c0/0xa40 [ 625.356702] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 625.361819] ? save_stack+0x43/0xd0 [ 625.361888] FAULT_INJECTION: forcing a failure. [ 625.361888] name failslab, interval 1, probability 0, space 0, times 0 [ 625.365430] ? kasan_kmalloc+0xad/0xe0 [ 625.365437] ? __kmalloc+0x162/0x760 [ 625.365450] ? __list_lru_init+0xcf/0x750 [ 625.365471] ? find_held_lock+0x35/0x1d0 [ 625.365492] ? __lock_is_held+0xb6/0x140 [ 625.365525] ? check_same_owner+0x320/0x320 [ 625.400713] ? rcu_note_context_switch+0x710/0x710 [ 625.405642] should_failslab+0xec/0x120 [ 625.409602] kmem_cache_alloc_node_trace+0x5a/0x760 [ 625.414599] ? mark_held_locks+0xaf/0x100 [ 625.418735] ? __raw_spin_lock_init+0x1c/0x100 [ 625.423311] __kmalloc_node+0x33/0x70 [ 625.427097] kvmalloc_node+0x99/0xd0 [ 625.430798] __list_lru_init+0x5d5/0x750 [ 625.434851] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 625.440724] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 625.445728] ? __lockdep_init_map+0xe4/0x650 [ 625.450125] ? lockdep_init_map+0x9/0x10 [ 625.454174] sget_userns+0x691/0xe40 [ 625.457869] ? set_anon_super+0x20/0x20 [ 625.461832] ? put_filp+0x90/0x90 [ 625.465272] ? destroy_unused_super.part.6+0xd0/0xd0 [ 625.470359] ? alloc_vfsmnt+0x762/0x9c0 [ 625.474314] ? path_lookupat+0x238/0xba0 [ 625.478357] ? mnt_free_id.isra.21+0x50/0x50 [ 625.482755] ? trace_hardirqs_off+0x10/0x10 [ 625.487064] ? putname+0xee/0x130 [ 625.490508] ? cap_capable+0x1b5/0x230 [ 625.494389] ? security_capable+0x8e/0xc0 [ 625.498527] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 625.503696] ? ns_capable_common+0xcf/0x160 [ 625.508004] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 625.513174] mount_ns+0x6d/0x190 [ 625.516532] rpc_mount+0x9e/0xd0 [ 625.519885] mount_fs+0x66/0x2d0 [ 625.523239] vfs_kern_mount.part.26+0xc6/0x4a0 [ 625.527807] ? may_umount+0xa0/0xa0 [ 625.531418] ? _raw_read_unlock+0x22/0x30 [ 625.535545] ? __get_fs_type+0x8a/0xc0 [ 625.539442] do_mount+0xea4/0x2bb0 [ 625.542967] ? __might_fault+0x110/0x1d0 [ 625.547025] ? copy_mount_string+0x40/0x40 [ 625.551243] ? check_same_owner+0x320/0x320 [ 625.555550] ? __check_object_size+0x8b/0x530 [ 625.560042] ? __might_sleep+0x95/0x190 [ 625.564012] ? kasan_check_write+0x14/0x20 [ 625.568233] ? _copy_from_user+0x99/0x110 [ 625.572368] ? memdup_user+0x5e/0x90 [ 625.576066] ? copy_mount_options+0x1f7/0x2e0 [ 625.580551] SyS_mount+0xab/0x120 [ 625.583986] ? copy_mnt_ns+0xb30/0xb30 [ 625.587861] do_syscall_64+0x281/0x940 [ 625.591730] ? __do_page_fault+0xc90/0xc90 [ 625.595954] ? _raw_spin_unlock_irq+0x27/0x70 [ 625.600431] ? finish_task_switch+0x1c1/0x7e0 [ 625.604910] ? syscall_return_slowpath+0x550/0x550 [ 625.609822] ? syscall_return_slowpath+0x2ac/0x550 [ 625.614738] ? prepare_exit_to_usermode+0x350/0x350 [ 625.619741] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 625.625096] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 625.629931] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 625.635104] RIP: 0033:0x4548b9 [ 625.638276] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 625.645969] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 625.653221] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 625.660472] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 625.667735] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 625.674990] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 625.682279] CPU: 1 PID: 327 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 625.689388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.698740] Call Trace: [ 625.701322] dump_stack+0x194/0x24d [ 625.704939] ? arch_local_irq_restore+0x53/0x53 [ 625.709624] should_fail+0x8c0/0xa40 [ 625.713324] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 625.718428] ? lock_downgrade+0x980/0x980 [ 625.722578] ? get_pid_task+0xbc/0x140 [ 625.726461] ? proc_fail_nth_write+0x9b/0x1d0 [ 625.730939] ? map_files_get_link+0x3a0/0x3a0 [ 625.735888] ? find_held_lock+0x35/0x1d0 [ 625.740000] ? check_same_owner+0x320/0x320 [ 625.744309] ? __lock_is_held+0xb6/0x140 [ 625.748352] ? rcu_note_context_switch+0x710/0x710 [ 625.753269] should_failslab+0xec/0x120 [ 625.757235] __kmalloc_track_caller+0x5f/0x760 [ 625.761815] ? strncpy_from_user+0x430/0x430 [ 625.766203] ? strndup_user+0x62/0xb0 [ 625.769987] memdup_user+0x2c/0x90 [ 625.773517] strndup_user+0x62/0xb0 [ 625.777140] SyS_mount+0x3c/0x120 [ 625.780583] ? copy_mnt_ns+0xb30/0xb30 [ 625.784462] do_syscall_64+0x281/0x940 [ 625.788337] ? __do_page_fault+0xc90/0xc90 [ 625.792563] ? _raw_spin_unlock_irq+0x27/0x70 [ 625.797046] ? finish_task_switch+0x1c1/0x7e0 [ 625.801528] ? syscall_return_slowpath+0x550/0x550 [ 625.806435] ? syscall_return_slowpath+0x2ac/0x550 [ 625.811342] ? prepare_exit_to_usermode+0x350/0x350 [ 625.816344] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 625.821689] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 625.826516] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 625.831688] RIP: 0033:0x4548b9 [ 625.834864] RSP: 002b:00007ffb33c88c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 625.842554] RAX: ffffffffffffffda RBX: 00007ffb33c896d4 RCX: 00000000004548b9 [ 625.849807] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 625.857062] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 625.864311] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 625.871558] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/29 12:28:35 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:35 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[]}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000005c0)='mqueue\x00', 0x800000200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:35 executing program 1 (fault-call:11 fault-nth:8): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:35 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 625.969629] FAULT_INJECTION: forcing a failure. [ 625.969629] name failslab, interval 1, probability 0, space 0, times 0 [ 625.980974] CPU: 1 PID: 344 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 625.988171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.997527] Call Trace: [ 626.000116] dump_stack+0x194/0x24d [ 626.003743] ? arch_local_irq_restore+0x53/0x53 [ 626.008418] should_fail+0x8c0/0xa40 [ 626.012123] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 626.017220] ? find_next_zero_bit+0xe3/0x110 [ 626.021630] ? trace_hardirqs_off+0x10/0x10 [ 626.025950] ? __lock_is_held+0xb6/0x140 [ 626.030002] ? find_held_lock+0x35/0x1d0 [ 626.034060] ? __lock_is_held+0xb6/0x140 [ 626.038114] ? check_same_owner+0x320/0x320 [ 626.042435] ? rcu_note_context_switch+0x710/0x710 [ 626.047357] ? rcu_note_context_switch+0x710/0x710 [ 626.052286] should_failslab+0xec/0x120 [ 626.056244] __kmalloc+0x63/0x760 [ 626.059685] ? lockdep_init_map+0x9/0x10 [ 626.063745] ? debug_mutex_init+0x2d/0x60 [ 626.067888] ? __list_lru_init+0xcf/0x750 [ 626.072041] __list_lru_init+0xcf/0x750 [ 626.076010] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 626.081891] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 626.086889] ? __lockdep_init_map+0xe4/0x650 [ 626.091285] ? lockdep_init_map+0x9/0x10 [ 626.095347] sget_userns+0x691/0xe40 [ 626.099047] ? set_anon_super+0x20/0x20 [ 626.103021] ? put_filp+0x90/0x90 [ 626.106457] ? destroy_unused_super.part.6+0xd0/0xd0 [ 626.111536] ? alloc_vfsmnt+0x762/0x9c0 [ 626.115488] ? path_lookupat+0x238/0xba0 [ 626.119532] ? mnt_free_id.isra.21+0x50/0x50 [ 626.123925] ? trace_hardirqs_off+0x10/0x10 [ 626.128226] ? putname+0xee/0x130 [ 626.131658] ? cap_capable+0x1b5/0x230 [ 626.135534] ? security_capable+0x8e/0xc0 [ 626.139662] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 626.144843] ? ns_capable_common+0xcf/0x160 [ 626.149146] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 626.154316] mount_ns+0x6d/0x190 [ 626.157669] rpc_mount+0x9e/0xd0 [ 626.161024] mount_fs+0x66/0x2d0 [ 626.164383] vfs_kern_mount.part.26+0xc6/0x4a0 [ 626.168944] ? may_umount+0xa0/0xa0 [ 626.172551] ? _raw_read_unlock+0x22/0x30 [ 626.176677] ? __get_fs_type+0x8a/0xc0 [ 626.180563] do_mount+0xea4/0x2bb0 [ 626.184091] ? __might_fault+0x110/0x1d0 [ 626.188154] ? copy_mount_string+0x40/0x40 [ 626.192374] ? check_same_owner+0x320/0x320 [ 626.196678] ? __check_object_size+0x8b/0x530 [ 626.201173] ? __might_sleep+0x95/0x190 [ 626.205148] ? kasan_check_write+0x14/0x20 [ 626.209364] ? _copy_from_user+0x99/0x110 [ 626.213506] ? memdup_user+0x5e/0x90 [ 626.217204] ? copy_mount_options+0x1f7/0x2e0 [ 626.221680] SyS_mount+0xab/0x120 [ 626.225112] ? copy_mnt_ns+0xb30/0xb30 [ 626.228981] do_syscall_64+0x281/0x940 [ 626.232860] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 626.238379] ? syscall_return_slowpath+0x550/0x550 [ 626.243292] ? syscall_return_slowpath+0x2ac/0x550 [ 626.248207] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 626.253580] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 626.258412] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 626.263579] RIP: 0033:0x4548b9 2018/03/29 12:28:35 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)="000000000000bfbc000000", 0x11ffffe, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000700)='f2fs\x00', 0x10, &(0x7f0000000ac0)="78d948394c2c4870c721be45449cdceadb1bc0f7902de85101030c9c455825cf0642f7ff3400b6e19035ad91bee95fc732b4dd6e1f441bbfb17289184071f47a41b6793d193d7233d235d3531a07a3181554fb154e74fef1152376d48a3974a1e3e022c9b071d112135239bdf157c899ca6ce105b6bdca6033601b6e1ac67ddd648ed3dce49766d761fa70060cde7743282cf85df8731d5f2184fb6e7dbf0c69519fea55b342fbc2b5f26af37f457dc410d3e17bbbeb2d33e754d3205c73dce5cb2d8b9dfb13a4b64d584574616fabdf9cc5d219c5251e39810e63873060de5abf68fb03cab43c51371e98162c2ff05976c20cbc080edc754bb4") mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 626.266753] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 626.274437] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 626.281685] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 626.288930] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 626.296182] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 626.303428] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/29 12:28:35 executing program 1 (fault-call:11 fault-nth:9): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:35 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:35 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 626.430612] FAULT_INJECTION: forcing a failure. [ 626.430612] name failslab, interval 1, probability 0, space 0, times 0 [ 626.442069] CPU: 0 PID: 375 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 626.449180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.458538] Call Trace: [ 626.461133] dump_stack+0x194/0x24d [ 626.464740] ? arch_local_irq_restore+0x53/0x53 [ 626.469404] ? rcutorture_record_progress+0x10/0x10 [ 626.474454] should_fail+0x8c0/0xa40 [ 626.478147] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 626.483231] ? __kernel_text_address+0xd/0x40 [ 626.487702] ? unwind_get_return_address+0x61/0xa0 [ 626.492623] ? find_held_lock+0x35/0x1d0 [ 626.496666] ? __lock_is_held+0xb6/0x140 [ 626.500736] ? check_same_owner+0x320/0x320 [ 626.505055] ? rcu_note_context_switch+0x710/0x710 [ 626.509987] should_failslab+0xec/0x120 [ 626.513956] kmem_cache_alloc_trace+0x4b/0x740 [ 626.518531] ? __kmalloc_node+0x33/0x70 [ 626.522498] ? __kmalloc_node+0x33/0x70 [ 626.526465] ? rcu_read_lock_sched_held+0x108/0x120 [ 626.531471] __memcg_init_list_lru_node+0x169/0x270 [ 626.536487] ? list_lru_add+0x7c0/0x7c0 [ 626.540465] ? __kmalloc_node+0x47/0x70 [ 626.544442] __list_lru_init+0x544/0x750 [ 626.548485] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 626.554350] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 626.559352] ? __lockdep_init_map+0xe4/0x650 [ 626.563752] ? lockdep_init_map+0x9/0x10 [ 626.567793] sget_userns+0x691/0xe40 [ 626.571485] ? set_anon_super+0x20/0x20 [ 626.575451] ? put_filp+0x90/0x90 [ 626.578892] ? destroy_unused_super.part.6+0xd0/0xd0 [ 626.583986] ? alloc_vfsmnt+0x762/0x9c0 [ 626.587939] ? path_lookupat+0x238/0xba0 [ 626.591993] ? mnt_free_id.isra.21+0x50/0x50 [ 626.596389] ? trace_hardirqs_off+0x10/0x10 [ 626.600689] ? putname+0xee/0x130 [ 626.604122] ? cap_capable+0x1b5/0x230 [ 626.607992] ? security_capable+0x8e/0xc0 [ 626.612127] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 626.617300] ? ns_capable_common+0xcf/0x160 [ 626.621602] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 626.626769] mount_ns+0x6d/0x190 [ 626.630117] rpc_mount+0x9e/0xd0 [ 626.633460] mount_fs+0x66/0x2d0 [ 626.636815] vfs_kern_mount.part.26+0xc6/0x4a0 [ 626.641462] ? may_umount+0xa0/0xa0 [ 626.645066] ? _raw_read_unlock+0x22/0x30 [ 626.649187] ? __get_fs_type+0x8a/0xc0 [ 626.653062] do_mount+0xea4/0x2bb0 [ 626.656579] ? __might_fault+0x110/0x1d0 [ 626.660631] ? copy_mount_string+0x40/0x40 [ 626.664844] ? check_same_owner+0x320/0x320 [ 626.669142] ? __check_object_size+0x8b/0x530 [ 626.673618] ? __might_sleep+0x95/0x190 [ 626.677574] ? kasan_check_write+0x14/0x20 [ 626.681794] ? _copy_from_user+0x99/0x110 [ 626.685921] ? memdup_user+0x5e/0x90 [ 626.689610] ? copy_mount_options+0x1f7/0x2e0 [ 626.694092] SyS_mount+0xab/0x120 [ 626.697526] ? copy_mnt_ns+0xb30/0xb30 [ 626.701399] do_syscall_64+0x281/0x940 [ 626.705620] ? __do_page_fault+0xc90/0xc90 [ 626.709830] ? _raw_spin_unlock_irq+0x27/0x70 [ 626.714303] ? finish_task_switch+0x1c1/0x7e0 [ 626.718775] ? syscall_return_slowpath+0x550/0x550 [ 626.723689] ? syscall_return_slowpath+0x2ac/0x550 [ 626.728688] ? prepare_exit_to_usermode+0x350/0x350 [ 626.733685] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 626.739039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 626.743865] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 626.749038] RIP: 0033:0x4548b9 [ 626.752206] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 626.759900] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 626.767148] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 626.774407] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 626.781662] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 626.788908] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 2018/03/29 12:28:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xffffffffffffffa3}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000740)={r4, &(0x7f0000000240)="8340166c898e051d6a8a567be99a1df730aa8230ae6a9f80fe388a6d58bd5ca7353c106bfc737cbbc9c751d8327832536ee4bd7065f5a8580658c1867503fbedf9048aa967528680a2191ef8e79156b4bf52c35ab017eb1ca0a471d5a2812b19e6055c4ed9faf7c426c314", &(0x7f00000009c0)="ed24b5b13f30d8e5001161323798d87439e0d7075afb73ee0af1eafbe7f0da7638c1e004da56b491be694628f4715d63d214c566c034599b7c703680cc63acef317d76cb", 0x2}, 0x20) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x0, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0xd, 0x3, 0xfd22, 0x3, 0x10, r0, 0xff}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x4, 0x4, 0x2, 0x9, 0x4, r0, 0x467}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='afs\x00', 0x400, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 1 (fault-call:11 fault-nth:10): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 626.895874] FAULT_INJECTION: forcing a failure. [ 626.895874] name failslab, interval 1, probability 0, space 0, times 0 [ 626.907300] CPU: 1 PID: 398 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 626.914410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 626.923773] Call Trace: [ 626.926369] dump_stack+0x194/0x24d [ 626.930003] ? arch_local_irq_restore+0x53/0x53 [ 626.934686] ? rcutorture_record_progress+0x10/0x10 [ 626.939705] should_fail+0x8c0/0xa40 [ 626.943406] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 626.948502] ? __kernel_text_address+0xd/0x40 [ 626.952990] ? unwind_get_return_address+0x61/0xa0 [ 626.957928] ? find_held_lock+0x35/0x1d0 [ 626.961980] ? __lock_is_held+0xb6/0x140 [ 626.966054] ? check_same_owner+0x320/0x320 [ 626.970366] ? rcu_note_context_switch+0x710/0x710 [ 626.975288] should_failslab+0xec/0x120 [ 626.979247] kmem_cache_alloc_trace+0x4b/0x740 [ 626.983813] ? __kmalloc_node+0x33/0x70 [ 626.987780] ? __kmalloc_node+0x33/0x70 [ 626.991750] ? rcu_read_lock_sched_held+0x108/0x120 [ 626.996757] __memcg_init_list_lru_node+0x169/0x270 [ 627.001771] ? list_lru_add+0x7c0/0x7c0 [ 627.005736] ? __kmalloc_node+0x47/0x70 [ 627.009717] __list_lru_init+0x544/0x750 [ 627.013787] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 627.019674] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 627.024674] ? __lockdep_init_map+0xe4/0x650 [ 627.029063] ? lockdep_init_map+0x9/0x10 [ 627.033105] sget_userns+0x691/0xe40 [ 627.036798] ? set_anon_super+0x20/0x20 [ 627.040756] ? put_filp+0x90/0x90 [ 627.044185] ? destroy_unused_super.part.6+0xd0/0xd0 [ 627.049281] ? alloc_vfsmnt+0x762/0x9c0 [ 627.053233] ? path_lookupat+0x238/0xba0 [ 627.057271] ? mnt_free_id.isra.21+0x50/0x50 [ 627.061658] ? trace_hardirqs_off+0x10/0x10 [ 627.065961] ? putname+0xee/0x130 [ 627.069394] ? cap_capable+0x1b5/0x230 [ 627.073276] ? security_capable+0x8e/0xc0 [ 627.077409] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 627.082576] ? ns_capable_common+0xcf/0x160 [ 627.086882] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 627.092058] mount_ns+0x6d/0x190 [ 627.095412] rpc_mount+0x9e/0xd0 [ 627.098757] mount_fs+0x66/0x2d0 [ 627.102108] vfs_kern_mount.part.26+0xc6/0x4a0 [ 627.106669] ? may_umount+0xa0/0xa0 [ 627.110275] ? _raw_read_unlock+0x22/0x30 [ 627.114410] ? __get_fs_type+0x8a/0xc0 [ 627.118305] do_mount+0xea4/0x2bb0 [ 627.121822] ? __might_fault+0x110/0x1d0 [ 627.125873] ? copy_mount_string+0x40/0x40 [ 627.130093] ? check_same_owner+0x320/0x320 [ 627.134392] ? __check_object_size+0x8b/0x530 [ 627.139919] ? __might_sleep+0x95/0x190 [ 627.143886] ? kasan_check_write+0x14/0x20 [ 627.148101] ? _copy_from_user+0x99/0x110 [ 627.152232] ? memdup_user+0x5e/0x90 [ 627.155926] ? copy_mount_options+0x1f7/0x2e0 [ 627.160409] SyS_mount+0xab/0x120 [ 627.163848] ? copy_mnt_ns+0xb30/0xb30 [ 627.167721] do_syscall_64+0x281/0x940 [ 627.171588] ? __do_page_fault+0xc90/0xc90 [ 627.175802] ? _raw_spin_unlock_irq+0x27/0x70 [ 627.180278] ? finish_task_switch+0x1c1/0x7e0 [ 627.184753] ? syscall_return_slowpath+0x550/0x550 [ 627.189658] ? syscall_return_slowpath+0x2ac/0x550 [ 627.194579] ? prepare_exit_to_usermode+0x350/0x350 [ 627.199585] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 627.204931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 627.209759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.214925] RIP: 0033:0x4548b9 [ 627.218092] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 627.225776] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 627.233029] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 627.240282] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 12:28:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000580)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 1 (fault-call:11 fault-nth:11): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xa, 0x7fff, 0x7, 0x7fff, 0x3, r0, 0x6}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='pstore\x00', 0x200400, &(0x7f00000009c0)="9424bbf051462eae71bf4ad8d6dff193cbf0a66c537d8780344d34774f35333dc0d39aafc095bf2654bd9e6472119ce7788d8397728327ad4dafdec523322748597cbf4d35eb142971be0af8ffd865500319b642897d77ef5799b5078ee980afe7148a6d14448b313b89719f0ecabc29b4e84f1e5e192fd9437d54437e87563ade1170e6acfb0acbe35dd0c1eeef6edcd2519cd2f4e9fbf76d5ac198be44bd1e9dcc245a1e2e114b5b5c82b570454a99dc7d3fcfdef8cfdcad95a725961642768c36478b8e01db37") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 627.247532] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 627.254783] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/29 12:28:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:36 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 627.371450] FAULT_INJECTION: forcing a failure. [ 627.371450] name failslab, interval 1, probability 0, space 0, times 0 [ 627.382933] CPU: 1 PID: 430 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 627.390044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.399405] Call Trace: [ 627.402000] dump_stack+0x194/0x24d [ 627.405634] ? arch_local_irq_restore+0x53/0x53 [ 627.410288] ? __save_stack_trace+0x7e/0xd0 [ 627.414603] should_fail+0x8c0/0xa40 [ 627.418300] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 627.423380] ? kasan_kmalloc+0xad/0xe0 [ 627.427241] ? kmem_cache_alloc_trace+0x136/0x740 [ 627.432062] ? __memcg_init_list_lru_node+0x169/0x270 [ 627.437228] ? __list_lru_init+0x544/0x750 [ 627.441440] ? sget_userns+0x691/0xe40 [ 627.445309] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 627.450038] ? do_mount+0xea4/0x2bb0 [ 627.453727] ? SyS_mount+0xab/0x120 [ 627.457329] ? do_syscall_64+0x281/0x940 [ 627.461367] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.466714] ? find_held_lock+0x35/0x1d0 [ 627.470758] ? __lock_is_held+0xb6/0x140 [ 627.474810] ? check_same_owner+0x320/0x320 [ 627.479113] ? rcu_note_context_switch+0x710/0x710 [ 627.484035] should_failslab+0xec/0x120 [ 627.487988] kmem_cache_alloc_trace+0x4b/0x740 [ 627.492548] ? __kmalloc_node+0x33/0x70 [ 627.496497] ? __kmalloc_node+0x33/0x70 [ 627.500447] ? rcu_read_lock_sched_held+0x108/0x120 [ 627.505447] __memcg_init_list_lru_node+0x169/0x270 [ 627.510443] ? list_lru_add+0x7c0/0x7c0 [ 627.514393] ? __kmalloc_node+0x47/0x70 [ 627.518354] __list_lru_init+0x544/0x750 [ 627.522400] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 627.528263] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 627.533261] ? __lockdep_init_map+0xe4/0x650 [ 627.538487] ? lockdep_init_map+0x9/0x10 [ 627.542533] sget_userns+0x691/0xe40 [ 627.546226] ? set_anon_super+0x20/0x20 [ 627.550183] ? put_filp+0x90/0x90 [ 627.553634] ? destroy_unused_super.part.6+0xd0/0xd0 [ 627.558716] ? alloc_vfsmnt+0x762/0x9c0 [ 627.562669] ? path_lookupat+0x238/0xba0 [ 627.566709] ? mnt_free_id.isra.21+0x50/0x50 [ 627.571106] ? trace_hardirqs_off+0x10/0x10 [ 627.575407] ? putname+0xee/0x130 [ 627.578846] ? cap_capable+0x1b5/0x230 [ 627.582716] ? security_capable+0x8e/0xc0 [ 627.586846] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 627.592016] ? ns_capable_common+0xcf/0x160 [ 627.596323] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 627.601490] mount_ns+0x6d/0x190 [ 627.604843] rpc_mount+0x9e/0xd0 [ 627.608192] mount_fs+0x66/0x2d0 [ 627.611544] vfs_kern_mount.part.26+0xc6/0x4a0 [ 627.616109] ? may_umount+0xa0/0xa0 [ 627.619716] ? _raw_read_unlock+0x22/0x30 [ 627.623847] ? __get_fs_type+0x8a/0xc0 [ 627.627719] do_mount+0xea4/0x2bb0 [ 627.631337] ? __might_fault+0x110/0x1d0 [ 627.635385] ? copy_mount_string+0x40/0x40 [ 627.639605] ? check_same_owner+0x320/0x320 [ 627.643909] ? __check_object_size+0x8b/0x530 [ 627.648390] ? __might_sleep+0x95/0x190 [ 627.652353] ? kasan_check_write+0x14/0x20 [ 627.656569] ? _copy_from_user+0x99/0x110 [ 627.660704] ? memdup_user+0x5e/0x90 [ 627.664402] ? copy_mount_options+0x1f7/0x2e0 [ 627.668880] SyS_mount+0xab/0x120 [ 627.672310] ? copy_mnt_ns+0xb30/0xb30 [ 627.676187] do_syscall_64+0x281/0x940 [ 627.680058] ? __do_page_fault+0xc90/0xc90 [ 627.684273] ? _raw_spin_unlock_irq+0x27/0x70 [ 627.688745] ? finish_task_switch+0x1c1/0x7e0 [ 627.693225] ? syscall_return_slowpath+0x550/0x550 [ 627.698132] ? syscall_return_slowpath+0x2ac/0x550 [ 627.703043] ? prepare_exit_to_usermode+0x350/0x350 [ 627.708040] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 627.713392] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 12:28:36 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000580)=@sco, 0x80, &(0x7f0000000740)=[{&(0x7f0000000ac0)=""/249, 0xf9}, {&(0x7f0000000c00)=""/232, 0xe8}, {&(0x7f0000000700)}], 0x3, &(0x7f0000000d00)=""/106, 0x6a, 0x8}, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) sendmsg$kcm(r1, &(0x7f0000001380)={&(0x7f0000000d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x1, 0x0, 0x4, {0xa, 0x4e23, 0x5, @mcast2={0xff, 0x2, [], 0x1}, 0xb10c}}}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000700)}, {&(0x7f0000000e00)="1a270bc264167e4cfd47c36b5127304f579869e3303e7ef6ff", 0x19}], 0x2, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x4f8}, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 627.718219] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.723386] RIP: 0033:0x4548b9 [ 627.726555] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 627.734858] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 627.742109] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 627.749360] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 627.756612] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 627.764139] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/29 12:28:36 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:36 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair$ax25(0x3, 0x7, 0x6, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 1 (fault-call:11 fault-nth:12): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 627.895592] FAULT_INJECTION: forcing a failure. [ 627.895592] name failslab, interval 1, probability 0, space 0, times 0 [ 627.907121] CPU: 1 PID: 457 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 627.914228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.923579] Call Trace: [ 627.926171] dump_stack+0x194/0x24d [ 627.929825] ? arch_local_irq_restore+0x53/0x53 [ 627.934500] ? __save_stack_trace+0x7e/0xd0 [ 627.938829] should_fail+0x8c0/0xa40 [ 627.942540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 627.947632] ? kasan_kmalloc+0xad/0xe0 [ 627.951510] ? kmem_cache_alloc_trace+0x136/0x740 [ 627.956369] ? __memcg_init_list_lru_node+0x169/0x270 [ 627.961575] ? __list_lru_init+0x544/0x750 [ 627.965829] ? sget_userns+0x691/0xe40 [ 627.969737] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 627.974473] ? do_mount+0xea4/0x2bb0 [ 627.978166] ? SyS_mount+0xab/0x120 [ 627.981774] ? do_syscall_64+0x281/0x940 [ 627.985819] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 627.991180] ? find_held_lock+0x35/0x1d0 [ 627.995251] ? __lock_is_held+0xb6/0x140 [ 627.999308] ? check_same_owner+0x320/0x320 [ 628.003613] ? rcu_note_context_switch+0x710/0x710 [ 628.008528] should_failslab+0xec/0x120 [ 628.012483] kmem_cache_alloc_trace+0x4b/0x740 [ 628.017056] ? __kmalloc_node+0x33/0x70 [ 628.021019] ? __kmalloc_node+0x33/0x70 [ 628.024986] ? rcu_read_lock_sched_held+0x108/0x120 [ 628.030009] __memcg_init_list_lru_node+0x169/0x270 [ 628.035040] ? list_lru_add+0x7c0/0x7c0 [ 628.039009] ? __kmalloc_node+0x47/0x70 [ 628.042995] __list_lru_init+0x544/0x750 [ 628.047070] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 628.052950] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 628.057979] ? __lockdep_init_map+0xe4/0x650 [ 628.062376] ? lockdep_init_map+0x9/0x10 [ 628.066429] sget_userns+0x691/0xe40 [ 628.070133] ? set_anon_super+0x20/0x20 [ 628.074100] ? put_filp+0x90/0x90 [ 628.077538] ? destroy_unused_super.part.6+0xd0/0xd0 [ 628.082634] ? alloc_vfsmnt+0x762/0x9c0 [ 628.086591] ? path_lookupat+0x238/0xba0 [ 628.090631] ? mnt_free_id.isra.21+0x50/0x50 [ 628.095037] ? trace_hardirqs_off+0x10/0x10 [ 628.099351] ? putname+0xee/0x130 [ 628.102794] ? cap_capable+0x1b5/0x230 [ 628.106669] ? security_capable+0x8e/0xc0 [ 628.110803] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 628.115973] ? ns_capable_common+0xcf/0x160 [ 628.120278] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 628.125452] mount_ns+0x6d/0x190 [ 628.128811] rpc_mount+0x9e/0xd0 [ 628.132163] mount_fs+0x66/0x2d0 [ 628.135515] vfs_kern_mount.part.26+0xc6/0x4a0 [ 628.140082] ? may_umount+0xa0/0xa0 [ 628.143689] ? _raw_read_unlock+0x22/0x30 [ 628.147824] ? __get_fs_type+0x8a/0xc0 [ 628.151697] do_mount+0xea4/0x2bb0 [ 628.155215] ? __might_fault+0x110/0x1d0 [ 628.159270] ? copy_mount_string+0x40/0x40 [ 628.163501] ? check_same_owner+0x320/0x320 [ 628.167806] ? __check_object_size+0x8b/0x530 [ 628.172292] ? __might_sleep+0x95/0x190 [ 628.176252] ? kasan_check_write+0x14/0x20 [ 628.180475] ? _copy_from_user+0x99/0x110 [ 628.184614] ? memdup_user+0x5e/0x90 [ 628.188312] ? copy_mount_options+0x1f7/0x2e0 [ 628.192809] SyS_mount+0xab/0x120 [ 628.196245] ? copy_mnt_ns+0xb30/0xb30 [ 628.200114] do_syscall_64+0x281/0x940 [ 628.203987] ? __do_page_fault+0xc90/0xc90 [ 628.208219] ? _raw_spin_unlock_irq+0x27/0x70 [ 628.212707] ? finish_task_switch+0x1c1/0x7e0 [ 628.217194] ? syscall_return_slowpath+0x550/0x550 [ 628.222118] ? syscall_return_slowpath+0x2ac/0x550 [ 628.227056] ? prepare_exit_to_usermode+0x350/0x350 [ 628.232074] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 628.237437] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 12:28:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:37 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) r5 = gettid() perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x5, 0xfffffffffffffffa, 0x3, 0xffffffff80000001, 0x0, 0xffffffffffffffe0, 0x8000, 0x8, 0x3, 0x47, 0x1, 0x54, 0x80000000, 0x2, 0x20, 0x79ec, 0x9, 0x10000, 0xb3, 0x4a, 0x4, 0x401, 0x4, 0x23, 0x6, 0x5, 0x4, 0x2, 0x4, 0x7, 0xfff, 0x6, 0x20, 0x9, 0x3ff, 0x8, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000700)}, 0x2000, 0x55e9, 0x5c, 0x4, 0x401, 0x9, 0xffffffffffffffff}, r5, 0x2, r2, 0x1) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000005c0)={r4, &(0x7f0000000580)="51df7fae", &(0x7f0000000ac0)="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", 0x1}, 0x20) 2018/03/29 12:28:37 executing program 1 (fault-call:11 fault-nth:13): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:37 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) sendmsg$kcm(r1, &(0x7f0000000ec0)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x27, 0x4, "55cc03a384b5e46cf32da8cd8d61078ee8c57c67978bd8d896254e2bb168ee541d1de254c7f94dcf77453ea6f3ab88685b2921a4887d25767eaaed22c9ff10", 0x20}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000009c0)="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", 0xfd}, {&(0x7f0000000700)="e41aa443808af1391a87a0756df7fb6ee94e03b56eca2c31a73c1f26a30f526aec28fd905b8af69c013d581e8a1aba3f402e2786fc1fbdd39be97b3f81edb1ffd3dc745f295fc64a5f5446bd8a3b83111763fb9f47426a5707768f2c9b41618d0c9f400df8df291c3a40282f7ac6f3da1aa3ef64fb0b248e079051d047", 0x7d}, {&(0x7f0000000c00)="621d0a0bcb37bbaa836d902c03a3bdae56c4d873898cf59af518c19d6d7098b33d4de5fb529074c2ee495103ae9dd43168a2c1e754634a60498bc7215bc09a65f4ab547d51abaa2979dd267c92d6", 0x4e}], 0x3, &(0x7f0000000c80)=[{0x48, 0x105, 0x80, "c5f05c3a15eb19382566950f3649c113f4adfe65b6ea949c2e0d0424ffcb83b6d6f3e5da54221eb9d40e6fa4e7bd0e3e9e3c"}, {0xf0, 0x10c, 0x4, "be3dbd0b5559daea2816b6db65bcfcb2f1ad0ed3aafe7ba578b818d9657fafa8147e5604516b5a92007de621d30f647be7f53f71f964f76b5cedf5a5747071ca6d58cffaa9933d3480ce9e22540d2e10d0973c86d38e5fc2370d167a96b65f69163f268d82161f57606ce079ba6530429cf9ab29c5f5c3d6b75354871ee1a256dc9704d30e0bf587db674ff64436d90411ade00cdbb54763ca00e3ee83e1f7a7742ef71de28ded80c0137c8bb7ef80b2e2d09fe607c0d39811e647b1f57edad53b1e8a8f5b2fbc9a655c4478bda2924d58ac83c34c94676b4e4c6c841fa15216"}, {0x108, 0x11b, 0x2d, "e35b0010f2409e8bcf5b5fd5f11c4da6c6fe09381d3d423a761473c3eef683128eac57f3e19123b4d1d4145ae9713f149d78ef4ac92af1a6d669f8c7b8d2f3cb78a48edf358507ea20577f07ba8c78b3bc0d1fcdbde6f402755076913926ff61abe4f4f94567a18fab1dced253911f395fb80cb76229e2e1c9af5f0aa7d621adfc6b539844179cd05f978e946775d92304de8674eaaab3a6c3a993c8b4b17da7ecb631ddc25d498e069f3e62ef3e87a1310c873c0ca81d16d5706a41f0e7620a13e2b4562698a981c89a6402e086c2140eba7221702ea30e35b61cf212e8b1285d43cc4a8e3318dd135e3ed0ce04b33d88651a4af0"}], 0x240, 0x4000000}, 0x40) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 628.242267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 628.247454] RIP: 0033:0x4548b9 [ 628.250629] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 628.258335] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 628.265589] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 628.272852] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 628.280107] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 628.287373] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/29 12:28:37 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x0, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:37 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 628.394725] FAULT_INJECTION: forcing a failure. [ 628.394725] name failslab, interval 1, probability 0, space 0, times 0 [ 628.406240] CPU: 1 PID: 482 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 628.413358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.422722] Call Trace: [ 628.425316] dump_stack+0x194/0x24d [ 628.428931] ? arch_local_irq_restore+0x53/0x53 [ 628.433587] ? __save_stack_trace+0x7e/0xd0 [ 628.437906] should_fail+0x8c0/0xa40 [ 628.441604] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 628.446690] ? kasan_kmalloc+0xad/0xe0 [ 628.450555] ? kmem_cache_alloc_trace+0x136/0x740 [ 628.455381] ? __memcg_init_list_lru_node+0x169/0x270 [ 628.460550] ? __list_lru_init+0x544/0x750 [ 628.464767] ? sget_userns+0x691/0xe40 [ 628.468644] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 628.473382] ? do_mount+0xea4/0x2bb0 [ 628.477073] ? SyS_mount+0xab/0x120 [ 628.480689] ? do_syscall_64+0x281/0x940 [ 628.484731] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 628.490106] ? find_held_lock+0x35/0x1d0 [ 628.494155] ? __lock_is_held+0xb6/0x140 [ 628.498214] ? check_same_owner+0x320/0x320 [ 628.502524] ? rcu_note_context_switch+0x710/0x710 [ 628.507448] should_failslab+0xec/0x120 [ 628.511407] kmem_cache_alloc_trace+0x4b/0x740 [ 628.515969] ? __kmalloc_node+0x33/0x70 [ 628.519921] ? __kmalloc_node+0x33/0x70 [ 628.523879] ? rcu_read_lock_sched_held+0x108/0x120 [ 628.528890] __memcg_init_list_lru_node+0x169/0x270 [ 628.533892] ? list_lru_add+0x7c0/0x7c0 [ 628.537861] ? __kmalloc_node+0x47/0x70 [ 628.541824] __list_lru_init+0x544/0x750 [ 628.545874] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 628.551748] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 628.556751] ? __lockdep_init_map+0xe4/0x650 [ 628.561144] ? lockdep_init_map+0x9/0x10 [ 628.565194] sget_userns+0x691/0xe40 [ 628.568889] ? set_anon_super+0x20/0x20 [ 628.572847] ? put_filp+0x90/0x90 [ 628.576279] ? destroy_unused_super.part.6+0xd0/0xd0 [ 628.581359] ? alloc_vfsmnt+0x762/0x9c0 [ 628.585310] ? path_lookupat+0x238/0xba0 [ 628.589348] ? mnt_free_id.isra.21+0x50/0x50 [ 628.593747] ? trace_hardirqs_off+0x10/0x10 [ 628.598053] ? putname+0xee/0x130 [ 628.601493] ? cap_capable+0x1b5/0x230 [ 628.605370] ? security_capable+0x8e/0xc0 [ 628.609520] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 628.614711] ? ns_capable_common+0xcf/0x160 [ 628.619034] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 628.624204] mount_ns+0x6d/0x190 [ 628.627554] rpc_mount+0x9e/0xd0 [ 628.630903] mount_fs+0x66/0x2d0 [ 628.634253] vfs_kern_mount.part.26+0xc6/0x4a0 [ 628.638817] ? may_umount+0xa0/0xa0 [ 628.642422] ? _raw_read_unlock+0x22/0x30 [ 628.646547] ? __get_fs_type+0x8a/0xc0 [ 628.650419] do_mount+0xea4/0x2bb0 [ 628.653935] ? __might_fault+0x110/0x1d0 [ 628.657984] ? copy_mount_string+0x40/0x40 [ 628.662200] ? check_same_owner+0x320/0x320 [ 628.666501] ? __check_object_size+0x8b/0x530 [ 628.670985] ? __might_sleep+0x95/0x190 [ 628.674949] ? kasan_check_write+0x14/0x20 [ 628.679162] ? _copy_from_user+0x99/0x110 [ 628.683291] ? memdup_user+0x5e/0x90 [ 628.686987] ? copy_mount_options+0x1f7/0x2e0 [ 628.691468] SyS_mount+0xab/0x120 [ 628.694902] ? copy_mnt_ns+0xb30/0xb30 [ 628.698771] do_syscall_64+0x281/0x940 [ 628.702638] ? __do_page_fault+0xc90/0xc90 [ 628.706871] ? _raw_spin_unlock_irq+0x27/0x70 [ 628.711375] ? finish_task_switch+0x1c1/0x7e0 [ 628.715853] ? syscall_return_slowpath+0x550/0x550 [ 628.720762] ? syscall_return_slowpath+0x2ac/0x550 [ 628.725674] ? prepare_exit_to_usermode+0x350/0x350 [ 628.730672] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 628.736029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 628.740855] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 12:28:37 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 628.746027] RIP: 0033:0x4548b9 [ 628.749191] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 628.756875] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 628.764124] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 628.771371] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 628.778618] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 628.785867] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d 2018/03/29 12:28:37 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000580)=0xf8, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:38 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="1800795c00050000000800000000000018100005013f6f23256bb2da03807aafdc269dc7771fa32486caf3fa7b"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000280)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x0, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 1 (fault-call:11 fault-nth:14): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:38 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 628.965442] FAULT_INJECTION: forcing a failure. [ 628.965442] name failslab, interval 1, probability 0, space 0, times 0 [ 628.976828] CPU: 0 PID: 514 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 628.983926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.993267] Call Trace: [ 628.995843] dump_stack+0x194/0x24d [ 628.999451] ? arch_local_irq_restore+0x53/0x53 [ 629.004099] ? __save_stack_trace+0x7e/0xd0 [ 629.008411] should_fail+0x8c0/0xa40 [ 629.012103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 629.017182] ? kasan_kmalloc+0xad/0xe0 [ 629.021043] ? kmem_cache_alloc_trace+0x136/0x740 [ 629.025866] ? __memcg_init_list_lru_node+0x169/0x270 [ 629.031030] ? __list_lru_init+0x544/0x750 [ 629.035239] ? sget_userns+0x691/0xe40 [ 629.039105] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 629.043833] ? do_mount+0xea4/0x2bb0 [ 629.047522] ? SyS_mount+0xab/0x120 [ 629.051127] ? do_syscall_64+0x281/0x940 [ 629.055164] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.060511] ? find_held_lock+0x35/0x1d0 [ 629.064554] ? __lock_is_held+0xb6/0x140 [ 629.068607] ? check_same_owner+0x320/0x320 [ 629.072911] ? rcu_note_context_switch+0x710/0x710 [ 629.077830] should_failslab+0xec/0x120 [ 629.081785] kmem_cache_alloc_trace+0x4b/0x740 [ 629.086343] ? __kmalloc_node+0x33/0x70 [ 629.090303] __memcg_init_list_lru_node+0x169/0x270 [ 629.095308] ? list_lru_add+0x7c0/0x7c0 [ 629.099263] ? __kmalloc_node+0x47/0x70 [ 629.103225] __list_lru_init+0x544/0x750 [ 629.107271] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 629.113135] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 629.118130] ? __lockdep_init_map+0xe4/0x650 [ 629.122520] ? lockdep_init_map+0x9/0x10 [ 629.126565] sget_userns+0x691/0xe40 [ 629.130261] ? set_anon_super+0x20/0x20 [ 629.134222] ? put_filp+0x90/0x90 [ 629.137652] ? destroy_unused_super.part.6+0xd0/0xd0 [ 629.142730] ? alloc_vfsmnt+0x762/0x9c0 [ 629.146680] ? path_lookupat+0x238/0xba0 [ 629.150720] ? mnt_free_id.isra.21+0x50/0x50 [ 629.155109] ? trace_hardirqs_off+0x10/0x10 [ 629.159410] ? putname+0xee/0x130 [ 629.162848] ? cap_capable+0x1b5/0x230 [ 629.166717] ? security_capable+0x8e/0xc0 [ 629.170849] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 629.176025] ? ns_capable_common+0xcf/0x160 [ 629.180330] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 629.185505] mount_ns+0x6d/0x190 [ 629.188855] rpc_mount+0x9e/0xd0 [ 629.192203] mount_fs+0x66/0x2d0 [ 629.195551] vfs_kern_mount.part.26+0xc6/0x4a0 [ 629.200112] ? may_umount+0xa0/0xa0 [ 629.203720] ? _raw_read_unlock+0x22/0x30 [ 629.207849] ? __get_fs_type+0x8a/0xc0 [ 629.211722] do_mount+0xea4/0x2bb0 [ 629.215237] ? __might_fault+0x110/0x1d0 [ 629.219285] ? copy_mount_string+0x40/0x40 [ 629.223504] ? check_same_owner+0x320/0x320 [ 629.227802] ? __check_object_size+0x8b/0x530 [ 629.232285] ? __might_sleep+0x95/0x190 [ 629.236244] ? kasan_check_write+0x14/0x20 [ 629.240459] ? _copy_from_user+0x99/0x110 [ 629.244590] ? memdup_user+0x5e/0x90 [ 629.248280] ? copy_mount_options+0x1f7/0x2e0 [ 629.252757] SyS_mount+0xab/0x120 [ 629.256190] ? copy_mnt_ns+0xb30/0xb30 [ 629.260058] do_syscall_64+0x281/0x940 [ 629.263926] ? __do_page_fault+0xc90/0xc90 [ 629.268134] ? _raw_spin_unlock_irq+0x27/0x70 [ 629.272605] ? finish_task_switch+0x1c1/0x7e0 [ 629.277080] ? syscall_return_slowpath+0x550/0x550 [ 629.281989] ? syscall_return_slowpath+0x2ac/0x550 [ 629.286899] ? prepare_exit_to_usermode+0x350/0x350 [ 629.291897] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 629.297244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 629.302071] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.307237] RIP: 0033:0x4548b9 2018/03/29 12:28:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:38 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x0, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x0, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 1 (fault-call:11 fault-nth:15): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:38 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$ax25(0x3, 0x7, 0xcf, &(0x7f0000000580)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) mkdir(&(0x7f00000009c0)='./file0\x00', 0x26) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair(0xb, 0x4, 0x24, &(0x7f00000005c0)={0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000700)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0/file0\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x5, 0x6, 0xd3f5, &(0x7f0000000740)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r2, 0x0, 0xb, 0xcb, &(0x7f0000000280)="78edc5757a9ec18e9ae757", &(0x7f00000009c0)=""/203, 0x6, 0x7ff}, 0x28) gettid() r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018104f00"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 629.310402] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 629.318089] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 629.325339] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 629.332585] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 629.339832] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 629.347079] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/29 12:28:38 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x0, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:38 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 629.460434] FAULT_INJECTION: forcing a failure. [ 629.460434] name failslab, interval 1, probability 0, space 0, times 0 [ 629.471755] CPU: 1 PID: 535 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 629.478861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.488223] Call Trace: [ 629.490829] dump_stack+0x194/0x24d [ 629.494475] ? arch_local_irq_restore+0x53/0x53 [ 629.499154] ? __save_stack_trace+0x7e/0xd0 [ 629.503484] should_fail+0x8c0/0xa40 [ 629.507202] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 629.512309] ? kasan_kmalloc+0xad/0xe0 [ 629.516195] ? kmem_cache_alloc_trace+0x136/0x740 [ 629.521041] ? __memcg_init_list_lru_node+0x169/0x270 [ 629.526234] ? __list_lru_init+0x544/0x750 [ 629.530469] ? sget_userns+0x691/0xe40 [ 629.534353] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 629.539563] ? do_mount+0xea4/0x2bb0 [ 629.543255] ? SyS_mount+0xab/0x120 [ 629.546866] ? do_syscall_64+0x281/0x940 [ 629.550907] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.556273] ? find_held_lock+0x35/0x1d0 [ 629.560326] ? __lock_is_held+0xb6/0x140 [ 629.564395] ? check_same_owner+0x320/0x320 [ 629.568708] ? rcu_note_context_switch+0x710/0x710 [ 629.573634] should_failslab+0xec/0x120 [ 629.577590] kmem_cache_alloc_trace+0x4b/0x740 [ 629.582152] ? __kmalloc_node+0x33/0x70 [ 629.586101] ? __kmalloc_node+0x33/0x70 [ 629.590064] ? rcu_read_lock_sched_held+0x108/0x120 [ 629.595085] __memcg_init_list_lru_node+0x169/0x270 [ 629.600100] ? list_lru_add+0x7c0/0x7c0 [ 629.604064] ? __kmalloc_node+0x47/0x70 [ 629.608042] __list_lru_init+0x544/0x750 [ 629.612095] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 629.617973] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 629.623012] ? __lockdep_init_map+0xe4/0x650 [ 629.627414] ? lockdep_init_map+0x9/0x10 [ 629.631469] sget_userns+0x691/0xe40 [ 629.635167] ? set_anon_super+0x20/0x20 [ 629.639138] ? put_filp+0x90/0x90 [ 629.642581] ? destroy_unused_super.part.6+0xd0/0xd0 [ 629.647669] ? alloc_vfsmnt+0x762/0x9c0 [ 629.651628] ? path_lookupat+0x238/0xba0 [ 629.655673] ? mnt_free_id.isra.21+0x50/0x50 [ 629.660076] ? trace_hardirqs_off+0x10/0x10 [ 629.664382] ? putname+0xee/0x130 [ 629.667818] ? cap_capable+0x1b5/0x230 [ 629.671693] ? security_capable+0x8e/0xc0 [ 629.675836] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 629.681016] ? ns_capable_common+0xcf/0x160 [ 629.685341] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 629.690514] mount_ns+0x6d/0x190 [ 629.693870] rpc_mount+0x9e/0xd0 [ 629.697222] mount_fs+0x66/0x2d0 [ 629.700574] vfs_kern_mount.part.26+0xc6/0x4a0 [ 629.705140] ? may_umount+0xa0/0xa0 [ 629.708749] ? _raw_read_unlock+0x22/0x30 [ 629.712878] ? __get_fs_type+0x8a/0xc0 [ 629.716752] do_mount+0xea4/0x2bb0 [ 629.720275] ? __might_fault+0x110/0x1d0 [ 629.724324] ? copy_mount_string+0x40/0x40 [ 629.728550] ? check_same_owner+0x320/0x320 [ 629.732862] ? __check_object_size+0x8b/0x530 [ 629.737360] ? __might_sleep+0x95/0x190 [ 629.741330] ? kasan_check_write+0x14/0x20 [ 629.745550] ? _copy_from_user+0x99/0x110 [ 629.749681] ? memdup_user+0x5e/0x90 [ 629.753372] ? copy_mount_options+0x1f7/0x2e0 [ 629.757853] SyS_mount+0xab/0x120 [ 629.761288] ? copy_mnt_ns+0xb30/0xb30 [ 629.765160] do_syscall_64+0x281/0x940 [ 629.769055] ? __do_page_fault+0xc90/0xc90 [ 629.773274] ? _raw_spin_unlock_irq+0x27/0x70 [ 629.777753] ? finish_task_switch+0x1c1/0x7e0 [ 629.782232] ? syscall_return_slowpath+0x550/0x550 [ 629.787140] ? syscall_return_slowpath+0x2ac/0x550 [ 629.792063] ? prepare_exit_to_usermode+0x350/0x350 [ 629.797072] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 629.802437] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 12:28:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x3, 0x200, 0x800, 0x61, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) sendmsg(r1, &(0x7f0000001fc0)={&(0x7f0000000700)=@can={0x1d}, 0x80, &(0x7f0000001c80)=[{&(0x7f0000000ac0)="f31d11e77eca0d140daed8f51a7cc59c13f26d05b496f1bad8bc5ead9a66597f73edba20c13483cf36800bafb36db4c46437483b1facd7d1a2f04cea70e868ae1d16cd65848e92dc0d5865e9857cfa022ca25cd17b6513a563eaa492dff2ef49076666d33af59abffd3059fcdef736324257691413f1e7ac1479b7e201e8101b1c1e14900ad5208873d5453ef275e80263e5e274df4d2d2129a0a0e80408413c7724fdd38cd7af820bd0a7b338d85a89c2ac2c834a967eaecea78722f0b02eb3907b51f1a44dc4560099b01ca6435db9778725c398c249fb57b94ef04259378a459a0a7f04de39", 0xe7}, {&(0x7f00000005c0)="55820b1029c91cf69deec1385d9536dfedc2203fc19144745b0c6cb9ae5ed678298e1599e380973708b38ff8dbada64ac8d10b3f126404", 0x37}, {&(0x7f0000000780)="750775a0", 0x4}, {&(0x7f0000000c00)="438fc780848dffdcc3d5fd7e8ab795da3d30bcfcf8281e5584", 0x19}, {&(0x7f0000000c40)="11cecb56145e7c569457e132375c", 0xe}, {&(0x7f0000000c80)="0e1e3c4a3c225dbeaceb959fab7d81f3f355bfab88cb18029ec29764581c3acd96c905284a4e59375ad28adf1eda712180c701f69c87edb77282142b70ebee81098fb3706fee393ebc0a84ca78a6c6160663884b87e1d124bb97a6c501a8621099f02fee1b3dbabcd334b2d4df598e271687dce8ad6eac21c2d68cda6a81edd833a2634a489b16cd1655150ba442907136b772cd4aee1fbc4b3ab49d358d842cb06fb2459b22bc61dcd7346a32ea4fb93dc03131e259f59a1c706d1980238a0c794db445497289909ba43ecab018a3f74915ff06ba438329f2328280c864f412edd2b50676bc32a219fd608587dddd9b81b252615f0da9dd7a414985e972089953e03d2a14f535b2774625c925556e73c2d82c5157ebfa53d828b132b29dea86a78a467a844529c69d041c16d746d65a8eca4dd55ecb5a08ebc8864f445623ac412c9fd3988cd3d8285beac34987b953059821907ec85323c3390587f61b0297926b762daf71866303ad86f0cc670e364a8e8befeb4b97b69acb6ae51737c3a23b086e89fd27268f23abe6a8f688967ee308c3ebbd1de154bf8b3e176e8925045184e494f6eb8f07c1537cf015598b57b9881e35516bca6f99b432bd2cde17d304d33fdfff8ae1188acd9e20aafc747bb0c7120b45e322a636de01f741383d67900b5efb5d7392746c4b690dc6626e7317cb0b073dcc3f3eb242c67d7b24cc9ed3de4889414ccfc91c3bd38dfa457f7553013e13a33e844a4c5bc7bd002e08fd6c9e86d29b20bc0592ea8db6b4b713f2fb47cb60be130daa4a2a04f9d9ad4455e5455f28128f87560013e6dcd4fc64347b0c83b33114e368300a8d2220d5cbc77242e25eb2db87ff0e59d8b004770ef6ed5117fff8c77424269b11df0c0734a5ff50b6d63d4583f18925ab89bf8858446a3cff0a10ebdf991137d75693e50aa00d967933daf75c9d5f4355b6be34a02c67d9cf6c76c70f4a9f67187d98786a2448e8763a730b279ea34c891216ba062e5ae0bbec4eacaba4ee17a708a298d5a81e14115aa65bb038fb4ce9a63ad1aa731e03d8a9ea7d30ddae20e99f9b4a8f1fe2ca11a62afa2d1b15e7adf867cade095f04102ae237e7ec39895554b18551f8c2074787852cce1fef8a2577d5a42651136ba540161e4aae37156b551aa8c900c4b04e421df0b626a7abaf8bd7b748c50738a7bf35bb6c02974999d04edd96b715b83798a966c75aae55d3b3778e498ea09e933a49ac2e5f28c08c8b4eeffeb58034cc9b44228d112842b1e925e362c36f4d2515a1974d6eb91074efe0e3359970090f9897e3c308f5fcfa20de4d390f382e27f7fb2d1a1fd665cb4cd1c1cc3298de077edefc2b13f82658e5e5a7aeb5b2d3d762860ac2c2690e31a049da5d4236c96ab914753bce4fd4bf9e913916b8b1e100ce7888b070c43a64582f5fd6fbf70398cf947a84f1302a11fff926a248a801ff6212f569c7d048a4d9d77e9ee2dc9ee40fb5c34f71b9d8aaff50260002bfd5138c6aa8d304fef08267b0130bb75d716702b4a893b6faa12232b7891ce1ccd0b88c0f5c2e69696e282bb0a3561ba44fc1e80b0585893d6ad79415cd52e9b953cbdad62db113b67512d4e1808cb52c26712f5b06b2c14ab576414261e1f9fd4c948aaf52ccd83c2c3b8b9669384708cf7537a429ee4d82a0ec49ec4418b0a6f4bd41ac7b4cf312821f1af6a914ab521a8dd9d3832d2979af15cfc4dfb7b983afdd0046522051ae0a0565ed194cae0569a915a709fc4ce81497f129a21ec87e36d47aa4f30f4d06262b53849bd9234f2a14dac6d42510b41af0228dcf8b3ed4c76f0e97a4c5245949a8a977634aeb311e3b726d3a930c13595abb93deacf9c3988b33bb61673d8961e04d9726ce1e17d02fbae81be1cf50e896bc395a8629ba351a5180e58541d6e340be7c47a9feabde77e2863c78445016668ff68eacb520b47aa31ff3f1bf1393be891967c515f100db5107a44da09edbede87808d19f21d166874da5b5e9d6b60b90ea0c62a6aa4b8eb27a65787484ebb81242de2f407faf8eaaf3112b85971c713a2682fc2d69de8d66a774d6fa49e63697a93f37b44ae654d78602e256e9053b63bec29538ed504b2222d464499360f42b484fdcbcfc2b7e4badf478b65c5d0477d45e3c8fd18ece6b5e68fc0449014709a0bdab115276221008e0f4fc757f66c2e45a02231cdb454d0ac2b7bd4ab12f8d512619fdbe0980c17d30fdfd1b45faa495f120e3c22d519fa9f72fb71249007286addf8000179fa842998ca509b441c61b10557e2d5305afcc04d7b66ce7e23ae41f905100ab4089d8ef04488cf5ef3e0e9470895405c42f676f65ab97be920fb01a6a85ea048d46f9daa84c9120439dfb84bf2f1088d41b2fe05baf8bf9e8c21a06ed2f7662d79e0ea9cee2e2ac1768b598fad38f41989aaf799b69f06fb08708796cb68135b8639359888c705cba181735f564dbbb15afdd38c32d0c5f467dc5a0bc928482dafa75efada076cfeb8a948197e58c716323749b42fb5749a6f0bced0ee3838fcf7be6aa5c0e86691c3db3b569fd2cdf50f593360a6dac8b4f2aa29b1486d3fadb8ca02b1466c850171ca69ed51f66681e27cb7a7ce512b3362347b3b99f1996a7f693b84435de3e9c840d60d12eaa15f2667c68aa40bff9d7cf96a64e2a469c619c53912930ff14915a9e2f0ac16f3b1daec46cfb18a2e7b0831cbb8d3321df397f90cfadee0d780c2a367f3881561abe7661dba9f93427dc7df882ae7a652bda5400b4223293ccb7650ac305980ded455dda86ed1ff8493c0ef6624e1b870ae5b78ea138aefdaff9caefcd8e5db75c87c008e0f927685e443220e9d4163641426355922299e417f0318a274666dd13345560ed64318c2ee12e69c4c117951b1c5634a021da17c883cc73b91b78c111f577efbca5a5f5bd00c57cea6ab3e481b6d6f7768cf473e7ee0ded37d402d61e1dfe600474a8c6bc7b606c835ad14ae4b3cb1c4330d942172b0a8283428b2ee702065e8fbc8d3725483d41b87123a5cc26fb47716520c026bcbb2998ca6b068bea6c5f0a4f73e22fa1e381b72dc9caf0fd9bdec169165d9d8b46743d9f5061737fe276c087c0370dea93d815ff3999f5c3010fed80b2ae76eef88d4d01dbcd6adaa659d76a8e1a76069c859a1505434d771d4cdfcf7a14e8884ba367eba2214b394c26f34dd06c90bfa9e45953796245a2809ab02c8a47abfb40b7df18e59f0b5d7243b142ad92ccda0b377757bcc8b5b143ff2fcf46dda39797c7649751582db5cccfcf0a114ac84f8c46df709cae7a7488d078481501afd517fa714f456ff931940ebaa49953ba65b4aea9c95984b01892ee0da4ea77b2470fe10368e643ad0728675e3e8722e808e7f89067c61afe63e9b1ba9e43f75362fbf2aab69d03f5c2ba3151df11ab0f515e573d1e9d66e1188a98737117c4f94c488156d69331e917c9155ba67cc993c1d3fa2edcb9e7096a129bbbf665fed491f8f3a944a94f8c5b4069ba2e40ac8545849fdc7747782f062e3883086aa3acd0a5cc905c844161fc3c8948f77161c56ba406309b0d825bcbca1cd4e15a4979baf5281ddba99421bb045b44aa61b22429f3c2655a7d117a605d2765e3d57a4a32e4ce3c1064aa0e128ccaec4ec8901ab28df916801f5b3de5436d087e07c143923e59d43c27f9353a7c69ca9fb17346e2f500cf888587b25c8627315488b044ebf0dbf40fa76db9067980523f301959e0b1d4a31bfe015f033cc88839564fa6b57ba1130928d80f7552a656609300f718dfe65d5e9a1ebaccb931be4552f99a1d3e952b3ff4bb83e0798e0c1c37d43f59b8cbdc282178e4b4330d4534e894f59e43573db90ba1ea0fc8a257492d8a4711d3b164cde9767587a2b1cedaee6768406f1d69477ed3629b663987f7eb9a4490515cf95927743efddafdf35f550fed0ce0e2a681fc80013e428ba3941967330c930a2756759e5722cbf1dcf658d7a01cb641c34027e7ec20b93491f4fe4b81e6b77fe34253b2222b5f6c996762b0186555f5e4b8a16b958a0c37bbd8eb9880ec7698ac4e9f6d9bb5d42d9654e65c6f8799d519b52790e424a03769dfe6558a4f236733b0d85d1ffc05a850991dd4b0f0a8156bf5732bb72bd30cd399831e9f32fb5a12b0b7a24c9846cbef6c6243d50f135135a2cd944f4eda73d557990d5f4ecbe75f85c4a5d416ce8733f793ea1b4f3bbc34c36bce800d1c924bcd56d19cdc96d4be04d40904d3c083419a4080ed43037d6702d0df382fb9f490e086fdb8c798ac3c06ae5febed34daaa9fbbe4e68c11a8338c8b108c081235a47029e8d0c1060fbf5f6805ea14d9fd810892edf92cff3c4fd1a501fa978b85201da3de1d25bb93b90bb856ee1a593d3cfc97ab1c26b248db6883b5ae5eb5a8640bc9281cbd6c8590f13bfc3760a7e018152164527614937455e3c028a01118d8f8070b85634afe2f96c6a1f0424b061b3f5931886f1e5f77985be66facc7f2f6182937863de9be958b51b110fb98db8adb5bc6b0de8cd09739a9ecdcc902106aa0e0a925cb10e2d9bb2a7ff1d6750cc85e08ddf84f2abff707f27eac4d9620c66410eccbcc23dfd732c5cad2bcd5a4cca21dfc86177eaadde6dce47f577a17e3d59b3799cc2960db02218babf2607739e3d9201af65dc3ec30c23140647c40f6e273fa3e9f58eed1540470c5c01558698d041e87131843c8ca005215b3b63046af93dafeccdd630a38481b899d495a600e840c1f8c4324da37de1bf25453e1342897dc3b6e82aba103ddc2b2895ca907b91ab734fd9f12078c723c3a79eb4a74327d5570e6813ceae9f43ae3f491ee0f31cfa8273ca40e3e567eb2c2aa76ddfb198bda1740ee02a2cb4b7e12cf18615959c9429ddc33ce7737f6e63c1c3254b37573dcb32677391f36a645a2b1f7986551fd5030bfa02998014c0fa4920ddfebaeb4932d1bb75d70cf64117ab1f5e6bae339c0dd73e28fd44b5d7cf5a6c8a93e4fc0bc2e8272905a9589297dc622698445187046ac1e5f03a99770da866536cfd3f0396ee5debc49b1d697480febaf378acc8f497a5b8db13c23857de1526126c05ea0fb1ee7d6489dd40426d536f8cb872f801d024a4465db18804a4292d93ae60c3cd4b7397f2b8897c908262efd80ef0d7d684d17b6382d1369cac5bf001a31a2eb783a0c5f716f925d5013776d53071f76816f22d00d8febefd26f79b20bb30fedcee2cf5e19f7ad6ccd1ce7b3da92c5a700ca88ca6a2580fadcc8777c6c2381e5000962c3bfb2332d47e3fc4b69d5d9c652c7baeb8f02f7cfe5b4cad0906d5c83b37abdcfbf5ea33c51f098291e44df3c024c7b2ff6cbb6d4bd42a4ecffe31bbffec631771a25fc6e788e8153859916709bbb530aca038166f27fd68d0a64ee3e3b568ff81b2e29884750922e95d7b1e88899a5d5c43b2f82e4de2fb1134776975c6c5933c07607f64153851f0343bce5b87ac8c5bd2481535ba0ed1acd66bfc94d476326478766c372abb9cbbc13072633317b26b0edbad72e856725e0f4e94b1dc13be80a3d9dd929df1e298d1e4f29fe907ed52972c2a7100744be1ce7e11e435fd32c0955aa758d1bc9dac08fc02e7a1106aa95f7139fc120fd1bdb716e001683762acd48e8338338727f3587dab6e2a01c695032ee6ea7322e707de72b49acd304a4d5833cdac377a3da01601583c05888fc263e1166e7c7cd9343aa1ef77df14e1dfa414ac8a4d6a3fe46c826b89b3194a8ae110c", 0x1000}], 0x6, &(0x7f0000001d00)=[{0x88, 0x0, 0x7f, "4171492417ea183cde07b51ffddc8027f9673dce1b542f7ddc496ade043ff615a5284caa34dac5e9954c08540b3ffb2e7e1ef3fd9c0afcc36ec300eb682b0a235a464dfe197e0a7160e6d706756ba667cfdff7404ad8e2889fad4d750c11eec4d7868502e619349eafad8433c6794fec242e"}, {0xd0, 0x6, 0x0, "4b47e667c672fd77e97d470010464c67fe208da4390721d6f5b71ff503c0cccc94e6b39032332cc11cc6f01e7d0be8eed74d2d39ae57e1b1b3f943398cb0d87253f1efff8ed9e28f3f821fa082779d5eadb9cfa41133c1730f493d29ae8e104ee3668fb6a1f4d4abde82ce7ba82608511fc205bcb9437b3b26911b520f21c8ad26c2fdf4545ae23f531c87f74c0ba2bfc79151fd837438412ed9e2baa9a93b8b6899baac40869da38ebeb37e4ec2bc866d2a806eede15cfd0aecd8c7c4cdb1"}, {0xa0, 0x101, 0x5, "6b8b1e5e815d85349ba7bb35d527dcac407df00b15d64f24135d0564c195f9683f90dc0677605095d50fb1e7b2ff070969e116cb48e62644e1a020ac0f622b24046d409b4488a6d178c510ab24ebf351d28a6a62ce760515b54583b4ebc06ee549a171eab217c7f3ffc561d94020ee04efa12d15fe72f4340c99881543ecf5badb93176cc6ab000171e370c4"}, {0xc0, 0x10f, 0xfff, "67de36002b1217ea3e4e3fc8f46c3a4c9907736cff7fea5719950868a238308a012cafbf5f039b8897fc7e90c7df6745864951e6864bf7743336eb6c9b95f6d307b11304a57cbcbc0abfbf4bc122b7d27e97038b568c47c1f8e1b4035f799e692e2b25a1e08fd60d8df46aa837afe4652760b417176e53267ad24fccae9b2d76467000c42b952de91c8b6e22efdd2d5e29d2c78394c05ae3c1cb2e9a1505c68ddb4cb13e44a7006195ee7a5020"}], 0x2b8, 0x40800}, 0x4800) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 629.807269] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 629.812437] RIP: 0033:0x4548b9 [ 629.815604] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 629.823293] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 629.830545] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 629.837797] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 629.845056] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 629.852329] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/29 12:28:39 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="4e35452725a57b4812a59c23cc9f0b1800020000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r3, 0x50, &(0x7f0000000240)}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x9, 0x4, 0x67, 0x4, 0x10, r1, 0x1}, 0x2c) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000009c0)='bpf\x00') mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x0, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002000)={r2, &(0x7f0000001ec0)="615134974748244a6cba0f3461e661dce96b4e9699f53d74f69e315e7d8c76dc849272531360cb1cbd1c77242b4a1b578f0b52077bf25149800b64f2fe6e505af7dcf29a928650e4383cdf2a966229c7dbde6252186f7941d95f3c85ce2d093ecb9328e5469bdea791f2d636cc507e80ab37f37cd18eaded2dbbf955423873eb4d59750d169870c8", &(0x7f0000001f80)=""/83}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) recvmsg(r1, &(0x7f0000000a80)={&(0x7f0000000240)=@hci, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000c00)=""/4096, 0x1000}, {&(0x7f0000000700)=""/10, 0xa}, {&(0x7f0000000740)=""/44, 0x2c}, {&(0x7f00000009c0)=""/115, 0x73}], 0x4, &(0x7f0000001c00)=""/194, 0xc2, 0x7}, 0x2000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001e80)={&(0x7f0000001d00)=@nl=@proc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000000b80)=""/41, 0x29}, {&(0x7f0000001d80)=""/14, 0xe}, {&(0x7f0000002d40)=""/4096, 0x1000}], 0x3, &(0x7f0000001e00)=""/68, 0x44, 0x20}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 1 (fault-call:11 fault-nth:16): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:39 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:39 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000009700000018100200", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000480)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000580)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0xf7d, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000780)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='omfs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000340)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f00000005c0)='minix\x00', 0x1000, &(0x7f0000000ac0)="e8753a7261903d2439f4d9a55ae118796f5aaf0f7558d45c55b26b4b49574b373626778407e747d72409d157db2fb0c504cf3dd4ed1f2016d8b70be2257b049f6e795a243a5d1dfcf540086c5695dbe7876bb3dfa8028cd7b2a3a6b9988f4c600a4f6f80c66d40271588d3067ac05c42cf2b4acc58a225db78c3aba629758559d1346dc94a0076081b32e2e56952b6bd339ff8d53b1b2da62c033f4866b4d19e0ebb5ec93a9ae11eac3da1af889ed9a6e53fd625a8f408dd9b1db3fbcc60807d32f73f0c28fb5adaf53a4cb1f96626b8d10fd302d51eb2eaf0d7c81b31f7d86697b37d") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 630.020400] FAULT_INJECTION: forcing a failure. [ 630.020400] name failslab, interval 1, probability 0, space 0, times 0 [ 630.031716] CPU: 1 PID: 565 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 630.038828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.048194] Call Trace: [ 630.050800] dump_stack+0x194/0x24d [ 630.054448] ? arch_local_irq_restore+0x53/0x53 [ 630.059121] ? __save_stack_trace+0x7e/0xd0 [ 630.063452] should_fail+0x8c0/0xa40 [ 630.067157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 630.072254] ? kasan_kmalloc+0xad/0xe0 [ 630.076131] ? kmem_cache_alloc_trace+0x136/0x740 [ 630.080965] ? __memcg_init_list_lru_node+0x169/0x270 [ 630.086153] ? __list_lru_init+0x544/0x750 [ 630.090382] ? sget_userns+0x691/0xe40 [ 630.094268] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 630.099013] ? do_mount+0xea4/0x2bb0 [ 630.102715] ? SyS_mount+0xab/0x120 [ 630.106325] ? do_syscall_64+0x281/0x940 [ 630.110367] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.115726] ? find_held_lock+0x35/0x1d0 [ 630.119773] ? __lock_is_held+0xb6/0x140 [ 630.123823] ? check_same_owner+0x320/0x320 [ 630.128124] ? rcu_note_context_switch+0x710/0x710 [ 630.133054] should_failslab+0xec/0x120 [ 630.137022] kmem_cache_alloc_trace+0x4b/0x740 [ 630.141588] ? __kmalloc_node+0x33/0x70 [ 630.145540] ? __kmalloc_node+0x33/0x70 [ 630.149508] ? rcu_read_lock_sched_held+0x108/0x120 [ 630.154511] __memcg_init_list_lru_node+0x169/0x270 [ 630.159511] ? list_lru_add+0x7c0/0x7c0 [ 630.163467] ? __kmalloc_node+0x47/0x70 [ 630.167424] __list_lru_init+0x544/0x750 [ 630.171482] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 630.177358] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 630.182357] ? __lockdep_init_map+0xe4/0x650 [ 630.186746] ? lockdep_init_map+0x9/0x10 [ 630.190787] sget_userns+0x691/0xe40 [ 630.194475] ? set_anon_super+0x20/0x20 [ 630.198443] ? put_filp+0x90/0x90 [ 630.201880] ? destroy_unused_super.part.6+0xd0/0xd0 [ 630.206958] ? alloc_vfsmnt+0x762/0x9c0 [ 630.210910] ? path_lookupat+0x238/0xba0 [ 630.214962] ? mnt_free_id.isra.21+0x50/0x50 2018/03/29 12:28:39 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x10000000000003, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 630.219354] ? trace_hardirqs_off+0x10/0x10 [ 630.223655] ? putname+0xee/0x130 [ 630.227106] ? cap_capable+0x1b5/0x230 [ 630.231010] ? security_capable+0x8e/0xc0 [ 630.235169] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 630.240358] ? ns_capable_common+0xcf/0x160 [ 630.244674] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 630.249842] mount_ns+0x6d/0x190 [ 630.253195] rpc_mount+0x9e/0xd0 [ 630.256550] mount_fs+0x66/0x2d0 [ 630.259924] vfs_kern_mount.part.26+0xc6/0x4a0 [ 630.264501] ? may_umount+0xa0/0xa0 [ 630.268123] ? _raw_read_unlock+0x22/0x30 [ 630.272260] ? __get_fs_type+0x8a/0xc0 [ 630.276138] do_mount+0xea4/0x2bb0 [ 630.279664] ? __might_fault+0x110/0x1d0 [ 630.283709] ? copy_mount_string+0x40/0x40 [ 630.287928] ? check_same_owner+0x320/0x320 [ 630.292238] ? __check_object_size+0x8b/0x530 [ 630.296718] ? __might_sleep+0x95/0x190 [ 630.300685] ? kasan_check_write+0x14/0x20 [ 630.304908] ? _copy_from_user+0x99/0x110 [ 630.309049] ? memdup_user+0x5e/0x90 [ 630.312743] ? copy_mount_options+0x1f7/0x2e0 [ 630.317222] SyS_mount+0xab/0x120 [ 630.320654] ? copy_mnt_ns+0xb30/0xb30 [ 630.324525] do_syscall_64+0x281/0x940 [ 630.328418] ? __do_page_fault+0xc90/0xc90 [ 630.332633] ? _raw_spin_unlock_irq+0x27/0x70 [ 630.337113] ? finish_task_switch+0x1c1/0x7e0 [ 630.341600] ? syscall_return_slowpath+0x550/0x550 [ 630.346529] ? syscall_return_slowpath+0x2ac/0x550 [ 630.351444] ? prepare_exit_to_usermode+0x350/0x350 [ 630.356443] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 630.361792] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.366622] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 12:28:39 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:39 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x0, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 630.371800] RIP: 0033:0x4548b9 [ 630.374967] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 630.382653] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 630.389900] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 630.397175] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 630.404433] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 630.411690] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/29 12:28:39 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x0, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 1 (fault-call:11 fault-nth:17): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:39 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:39 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 630.537632] FAULT_INJECTION: forcing a failure. [ 630.537632] name failslab, interval 1, probability 0, space 0, times 0 [ 630.548988] CPU: 1 PID: 595 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 630.556108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.565469] Call Trace: [ 630.568059] dump_stack+0x194/0x24d [ 630.571691] ? arch_local_irq_restore+0x53/0x53 [ 630.576358] ? __save_stack_trace+0x7e/0xd0 [ 630.580679] should_fail+0x8c0/0xa40 [ 630.584378] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 630.589462] ? kasan_kmalloc+0xad/0xe0 [ 630.593325] ? kmem_cache_alloc_trace+0x136/0x740 [ 630.598149] ? __memcg_init_list_lru_node+0x169/0x270 [ 630.603316] ? __list_lru_init+0x544/0x750 [ 630.607527] ? sget_userns+0x691/0xe40 [ 630.611396] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 630.616126] ? do_mount+0xea4/0x2bb0 [ 630.619816] ? SyS_mount+0xab/0x120 [ 630.623421] ? do_syscall_64+0x281/0x940 [ 630.627462] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.632811] ? find_held_lock+0x35/0x1d0 [ 630.636857] ? __lock_is_held+0xb6/0x140 [ 630.640910] ? check_same_owner+0x320/0x320 [ 630.645219] ? rcu_note_context_switch+0x710/0x710 [ 630.650136] should_failslab+0xec/0x120 [ 630.654090] kmem_cache_alloc_trace+0x4b/0x740 [ 630.658653] ? __kmalloc_node+0x33/0x70 [ 630.662619] __memcg_init_list_lru_node+0x169/0x270 [ 630.667620] ? list_lru_add+0x7c0/0x7c0 [ 630.671577] ? __kmalloc_node+0x47/0x70 [ 630.675541] __list_lru_init+0x544/0x750 [ 630.679593] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 630.685464] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 630.690461] ? __lockdep_init_map+0xe4/0x650 [ 630.694854] ? lockdep_init_map+0x9/0x10 [ 630.698899] sget_userns+0x691/0xe40 [ 630.702588] ? set_anon_super+0x20/0x20 [ 630.706573] ? put_filp+0x90/0x90 [ 630.710014] ? destroy_unused_super.part.6+0xd0/0xd0 [ 630.715098] ? alloc_vfsmnt+0x762/0x9c0 [ 630.719050] ? path_lookupat+0x238/0xba0 [ 630.723087] ? mnt_free_id.isra.21+0x50/0x50 [ 630.727499] ? trace_hardirqs_off+0x10/0x10 [ 630.731800] ? putname+0xee/0x130 [ 630.735238] ? cap_capable+0x1b5/0x230 [ 630.739107] ? security_capable+0x8e/0xc0 [ 630.743239] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 630.748406] ? ns_capable_common+0xcf/0x160 [ 630.752706] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 630.757872] mount_ns+0x6d/0x190 [ 630.761221] rpc_mount+0x9e/0xd0 [ 630.764575] mount_fs+0x66/0x2d0 [ 630.767924] vfs_kern_mount.part.26+0xc6/0x4a0 [ 630.772486] ? may_umount+0xa0/0xa0 [ 630.776094] ? _raw_read_unlock+0x22/0x30 [ 630.780220] ? __get_fs_type+0x8a/0xc0 [ 630.784092] do_mount+0xea4/0x2bb0 [ 630.787608] ? __might_fault+0x110/0x1d0 [ 630.791655] ? copy_mount_string+0x40/0x40 [ 630.795869] ? check_same_owner+0x320/0x320 [ 630.800168] ? __check_object_size+0x8b/0x530 [ 630.804647] ? __might_sleep+0x95/0x190 [ 630.808608] ? kasan_check_write+0x14/0x20 [ 630.812830] ? _copy_from_user+0x99/0x110 [ 630.816962] ? memdup_user+0x5e/0x90 [ 630.820827] ? copy_mount_options+0x1f7/0x2e0 [ 630.825305] SyS_mount+0xab/0x120 [ 630.828735] ? copy_mnt_ns+0xb30/0xb30 [ 630.832605] do_syscall_64+0x281/0x940 [ 630.836469] ? __do_page_fault+0xc90/0xc90 [ 630.840677] ? _raw_spin_unlock_irq+0x27/0x70 [ 630.845148] ? finish_task_switch+0x1c1/0x7e0 [ 630.849620] ? syscall_return_slowpath+0x550/0x550 [ 630.854524] ? syscall_return_slowpath+0x2ac/0x550 [ 630.859468] ? prepare_exit_to_usermode+0x350/0x350 [ 630.864467] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 630.869817] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 630.874653] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 630.879820] RIP: 0033:0x4548b9 [ 630.882988] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 630.890677] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 630.897922] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 630.905169] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 630.912420] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 630.919670] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/29 12:28:40 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:40 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:40 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000240)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') recvmsg(r4, &(0x7f0000002340)={&(0x7f0000001e80)=@can={0x0, 0x0}, 0x80, &(0x7f0000002280)=[{&(0x7f0000001f00)=""/116, 0x74}, {&(0x7f0000001f80)=""/151, 0x97}, {&(0x7f0000002d40)=""/4096, 0x1000}, {&(0x7f0000002040)=""/213, 0xd5}, {&(0x7f0000002140)=""/223, 0xdf}, {&(0x7f0000002240)=""/27, 0x1b}], 0x6, &(0x7f0000002300)=""/18, 0x12, 0x4}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000002380)={0xf, 0x2, &(0x7f0000000280)=@raw=[@generic={0x2, 0x4, 0x1, 0x8}], &(0x7f0000000700)='syzkaller\x00', 0x200, 0xc6, &(0x7f00000009c0)=""/198, 0x41f00, 0x1, [], r5}, 0x48) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x0, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 1 (fault-call:11 fault-nth:18): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x0, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x0, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 631.052574] FAULT_INJECTION: forcing a failure. [ 631.052574] name failslab, interval 1, probability 0, space 0, times 0 [ 631.063963] CPU: 1 PID: 626 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 631.071075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.080429] Call Trace: [ 631.083011] dump_stack+0x194/0x24d [ 631.086888] ? arch_local_irq_restore+0x53/0x53 [ 631.091560] ? __save_stack_trace+0x7e/0xd0 [ 631.095875] should_fail+0x8c0/0xa40 [ 631.099570] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 631.104655] ? kasan_kmalloc+0xad/0xe0 [ 631.108517] ? kmem_cache_alloc_trace+0x136/0x740 [ 631.113339] ? __memcg_init_list_lru_node+0x169/0x270 [ 631.118504] ? __list_lru_init+0x544/0x750 [ 631.122717] ? sget_userns+0x691/0xe40 [ 631.126587] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 631.131315] ? do_mount+0xea4/0x2bb0 [ 631.135002] ? SyS_mount+0xab/0x120 [ 631.138610] ? do_syscall_64+0x281/0x940 [ 631.142649] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.147994] ? find_held_lock+0x35/0x1d0 [ 631.152046] ? __lock_is_held+0xb6/0x140 [ 631.156098] ? check_same_owner+0x320/0x320 [ 631.160402] ? rcu_note_context_switch+0x710/0x710 [ 631.165319] should_failslab+0xec/0x120 [ 631.169273] kmem_cache_alloc_trace+0x4b/0x740 [ 631.173831] ? __kmalloc_node+0x33/0x70 [ 631.177780] ? __kmalloc_node+0x33/0x70 [ 631.181731] ? rcu_read_lock_sched_held+0x108/0x120 [ 631.186753] __memcg_init_list_lru_node+0x169/0x270 [ 631.191763] ? list_lru_add+0x7c0/0x7c0 [ 631.195717] ? __kmalloc_node+0x47/0x70 [ 631.199683] __list_lru_init+0x544/0x750 [ 631.203729] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 631.209598] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 631.214596] ? __lockdep_init_map+0xe4/0x650 [ 631.218990] ? lockdep_init_map+0x9/0x10 [ 631.223042] sget_userns+0x691/0xe40 [ 631.226735] ? set_anon_super+0x20/0x20 [ 631.230700] ? put_filp+0x90/0x90 [ 631.234137] ? destroy_unused_super.part.6+0xd0/0xd0 [ 631.239226] ? alloc_vfsmnt+0x762/0x9c0 [ 631.243182] ? path_lookupat+0x238/0xba0 [ 631.247225] ? mnt_free_id.isra.21+0x50/0x50 [ 631.251621] ? trace_hardirqs_off+0x10/0x10 [ 631.255925] ? putname+0xee/0x130 [ 631.259362] ? cap_capable+0x1b5/0x230 [ 631.263234] ? security_capable+0x8e/0xc0 [ 631.267365] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 631.272532] ? ns_capable_common+0xcf/0x160 [ 631.276855] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 631.282026] mount_ns+0x6d/0x190 [ 631.285379] rpc_mount+0x9e/0xd0 [ 631.288724] mount_fs+0x66/0x2d0 [ 631.292074] vfs_kern_mount.part.26+0xc6/0x4a0 [ 631.296637] ? may_umount+0xa0/0xa0 [ 631.300247] ? _raw_read_unlock+0x22/0x30 [ 631.304377] ? __get_fs_type+0x8a/0xc0 [ 631.308254] do_mount+0xea4/0x2bb0 [ 631.311780] ? __might_fault+0x110/0x1d0 [ 631.315829] ? copy_mount_string+0x40/0x40 [ 631.320045] ? check_same_owner+0x320/0x320 [ 631.324344] ? __check_object_size+0x8b/0x530 [ 631.328823] ? __might_sleep+0x95/0x190 [ 631.332784] ? kasan_check_write+0x14/0x20 [ 631.336995] ? _copy_from_user+0x99/0x110 [ 631.341128] ? memdup_user+0x5e/0x90 [ 631.344818] ? copy_mount_options+0x1f7/0x2e0 [ 631.349298] SyS_mount+0xab/0x120 [ 631.352729] ? copy_mnt_ns+0xb30/0xb30 [ 631.356602] do_syscall_64+0x281/0x940 [ 631.360467] ? __do_page_fault+0xc90/0xc90 [ 631.364677] ? _raw_spin_unlock_irq+0x27/0x70 [ 631.369151] ? finish_task_switch+0x1c1/0x7e0 [ 631.373626] ? syscall_return_slowpath+0x550/0x550 [ 631.378533] ? syscall_return_slowpath+0x2ac/0x550 [ 631.383440] ? prepare_exit_to_usermode+0x350/0x350 [ 631.388436] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 631.393784] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.398612] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 12:28:40 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair(0x3, 0x800, 0x4, &(0x7f0000000580)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xf, 0x7e, 0x3, 0x1, 0x11, r0}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x31) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) socket$kcm(0x29, 0x2, 0x0) [ 631.403782] RIP: 0033:0x4548b9 [ 631.406950] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 631.414639] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 631.421892] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 631.429140] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 631.436387] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 631.445111] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/29 12:28:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0xa, 0xffffffffffffff9c}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000240)={0x3, 0x0, [0x0, 0x0, 0x0]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00'}, 0x10) 2018/03/29 12:28:40 executing program 1 (fault-call:11 fault-nth:19): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:40 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") sendmsg$kcm(r1, &(0x7f0000000b80)={&(0x7f0000000240)=@l2={0x1f, 0x7, {0x7f06, 0x8, 0xffffffffffffff80, 0x1, 0x3}, 0xdb, 0x20}, 0x80, &(0x7f0000000a80)=[{&(0x7f00000009c0)="80a862d9175fe10bdc7bd65456e65d5440c317bdfacbd5fdcba4ddf315202f582deb73b6012feb9feab80f66c3928de377d6b0be4360585f982138047d599499df3517d80de482eed7220a323e61bf3551fbca7226cf9fbae75ec64f61ad743b2d8404fca0f317e42b47014434d469c8d68bd2c8261de2550f9b903ea1536252274857ade5a32d2d4f561559432550b2631d7112a60f783441c0ee4c7ae5ed13", 0xa0}, {&(0x7f0000000700)="ea2b41803d20999f4c7f8459d416801e389232bec9a18efaab3154063a6842c59b2b27087cbc3a02c07d4e6446e52de34b3bfa95758c44b1d53e8f9df0b143b0afd2ff3eb325999c2885526da9b5fb38ade31818c221ce9a395a3c6dc02082cca7", 0x61}], 0x2, &(0x7f0000000c00)=[{0x40, 0x3a, 0x4, "a457c5acf27e30a66a3412586e289ed6f2c1463f316718f1a7c7985e2a2dd84d5d0f83c44e9d7ddd0d4ef202"}, {0x18, 0x116, 0x5, "bafd0f"}, {0x60, 0x0, 0x1, "6bcfac859658b81b756ba9b1b8206c1cb88b94343e5d732814c7fdf6371844000aa4e9683b79f03bb1f0e16b5a95f329f8644e4907992f1b857d3edb881b3dc6fff8370d2d20377370e99f0e"}, {0x110, 0x0, 0x7, "d8243ed5185da6be036f5a6d66959c415bc0b90a5b55c97dd859a457e454fdb71beea5c47952edc97ea24fca70ba651833aedc8abeeea9c20261bd277ed132c3ffca84e90edb18cb6f6458d0b75fe325e5f352df5db15e2086c4762b3b503db8cbbff527ec846ffbb7d9c04c5af05c106e977fb0f200e43560d4f899a40eabfe4ae5f44e772661b5074b3ddf1d28b50fc909f4fca7f8652b1c7e1435d604ff7df450150f910fca9faa96c141e50dfed3c38b79c935e1e72c9f8aafcd1432859cf53ac4f8f141fe079f7dc15d7ca2522f093371f4b9a5f10c57489d2ef6189f696b6490256aff472eed22d6a1ce150d8c68f28fb3a6b54259e2b0d7a63410"}, {0x108, 0x116, 0x0, "0006817b27f461cd77df2533dfac086b77aa87f16b913d3572a4e4515c99fd5142217ae3b61d23d5fd44b55f09908e1de1f57713c7684abc60db2be0d347ede852132045efe3d8d377fec5a9fc2892b05d77f931a28a24a62213ec7fa930e37a5adbf74974e370769460832297b6c402f1410312f51c8319eb53b9b2b37e339aa7b9267cf04aa593bf7138004c65f052f7fd818fcdfab44e7d2e8e98cf7db898c533106d83e81895b672e4a9cb6a070c6bb7430d8d2893275f8b37b24a480b5943e1757907b0b543606ed7515f6a9cde913f079cad0a6a20b1fb0952e4d2ca5ab55720f345b61c4778b283279288efcbe0ec3f"}, {0x78, 0x11f, 0x7, "2e1ca752baa769d32c1991f443adf2b910b99115b06552d5f68ca7232a16c54c6c824f7159a60a2e702494c5bdb72ef17b3a86c82cbeb753f082c2f43a92abcce4e0eeaf20f488822fd0c5cbef6589be18d26fa380edbbfd114d172250ba2b010bcade8ecde3e5e4"}, {0x30, 0x102, 0x8, "b2bf4c462bfe5e1c58dad51061346751bcb2be770e4f32f57612a75c7680"}, {0x80, 0x0, 0x7, "17a980141818d455abc8b5e072f3e0a8a05c8c40f7ef047c0ff06e61ab3cb3d78bde5e6819c721e0cdb811346a9d972aa60f7e38977fa9e051dc86832405fa9b37afe6fdb21471e81c705d3052bcd47315ada202b80fee486fea2e25f3c2ab6d5c874492f23132858d21d24ce6a69395"}, {0x68, 0x11e, 0x842, "9ca498250ad2f34b4c707b6d353467df6f8647eb454c15366e0de99b786810c3126fbf968e940ceba451c71d099bd6b826aae2a429773793755ca48a15ffc03c062ba87a63ba9e3c5989c5994e9698e2bb33dc3781f6"}, {0x30, 0xff, 0x3, "0a185889447ecadb46784c5e989575696a00fca3d2b7e3669f7e155dc9d079"}], 0x490, 0x8000}, 0x4000001) 2018/03/29 12:28:40 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:40 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:40 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r3, 0x50, &(0x7f0000000580)}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000780)={0x6, 0x56, 0x200, 0x7f, 0x2, r4, 0x8001}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000740)="f9fe944fe20fa16179ca9c34aba7894a67673d21e4a8fa72696e6700") mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) r5 = gettid() perf_event_open(&(0x7f0000000ac0)={0x5, 0x70, 0x81, 0x0, 0xff, 0x4a4, 0x0, 0x8, 0x8100, 0x0, 0x6, 0x9, 0x9, 0x200, 0x4, 0x1, 0xfffffffffffffff8, 0x8, 0x495, 0x0, 0x200, 0x2, 0xb55d, 0x7, 0x9, 0x7, 0x5, 0x6, 0x7, 0x96d6, 0x20, 0x0, 0x6, 0x20, 0xffffffffffff1ad1, 0x7, 0x5a3, 0x8, 0x0, 0x8001, 0x5, @perf_config_ext={0x0, 0xffffffffffffff32}, 0x4000, 0x6, 0x9, 0x3, 0xc3, 0x8, 0x5d}, r5, 0x10, r2, 0x1cf4ce27b6340701) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x5, 0xc0b, 0x9, 0xf4, 0x8, r4, 0x3}, 0x2c) [ 631.670017] FAULT_INJECTION: forcing a failure. [ 631.670017] name failslab, interval 1, probability 0, space 0, times 0 [ 631.681372] CPU: 1 PID: 668 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 631.688490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.697851] Call Trace: [ 631.700462] dump_stack+0x194/0x24d [ 631.704113] ? arch_local_irq_restore+0x53/0x53 [ 631.708797] ? kernel_text_address+0x102/0x140 [ 631.713403] should_fail+0x8c0/0xa40 [ 631.717133] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 631.722265] ? save_stack+0x43/0xd0 [ 631.725899] ? kasan_kmalloc+0xad/0xe0 [ 631.729794] ? __kmalloc+0x162/0x760 [ 631.733519] ? __list_lru_init+0xcf/0x750 [ 631.737679] ? find_held_lock+0x35/0x1d0 [ 631.741756] ? __lock_is_held+0xb6/0x140 [ 631.745843] ? check_same_owner+0x320/0x320 [ 631.750184] ? rcu_note_context_switch+0x710/0x710 [ 631.755131] should_failslab+0xec/0x120 [ 631.759116] kmem_cache_alloc_node_trace+0x5a/0x760 [ 631.764141] ? mark_held_locks+0xaf/0x100 [ 631.768299] ? __raw_spin_lock_init+0x1c/0x100 [ 631.772898] __kmalloc_node+0x33/0x70 [ 631.776709] kvmalloc_node+0x99/0xd0 [ 631.780438] __list_lru_init+0x5d5/0x750 [ 631.784520] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 631.790412] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 631.795443] ? lockdep_init_map+0x9/0x10 [ 631.799518] sget_userns+0x6b1/0xe40 [ 631.803231] ? set_anon_super+0x20/0x20 [ 631.807208] ? put_filp+0x90/0x90 [ 631.810659] ? destroy_unused_super.part.6+0xd0/0xd0 [ 631.815801] ? alloc_vfsmnt+0x762/0x9c0 2018/03/29 12:28:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 631.819797] ? path_lookupat+0x238/0xba0 [ 631.823863] ? mnt_free_id.isra.21+0x50/0x50 [ 631.828291] ? trace_hardirqs_off+0x10/0x10 [ 631.832614] ? putname+0xee/0x130 [ 631.836076] ? cap_capable+0x1b5/0x230 [ 631.839968] ? security_capable+0x8e/0xc0 [ 631.844112] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 631.849305] ? ns_capable_common+0xcf/0x160 [ 631.853625] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 631.858800] mount_ns+0x6d/0x190 [ 631.862167] rpc_mount+0x9e/0xd0 [ 631.865538] mount_fs+0x66/0x2d0 [ 631.868918] vfs_kern_mount.part.26+0xc6/0x4a0 [ 631.873516] ? may_umount+0xa0/0xa0 [ 631.877141] ? _raw_read_unlock+0x22/0x30 [ 631.881287] ? __get_fs_type+0x8a/0xc0 [ 631.885173] do_mount+0xea4/0x2bb0 [ 631.888715] ? __might_fault+0x110/0x1d0 [ 631.892783] ? copy_mount_string+0x40/0x40 [ 631.897006] ? check_same_owner+0x320/0x320 [ 631.901322] ? __check_object_size+0x8b/0x530 [ 631.905809] ? __might_sleep+0x95/0x190 [ 631.909785] ? kasan_check_write+0x14/0x20 [ 631.914012] ? _copy_from_user+0x99/0x110 [ 631.918164] ? memdup_user+0x5e/0x90 [ 631.921864] ? copy_mount_options+0x1f7/0x2e0 [ 631.926349] SyS_mount+0xab/0x120 [ 631.929786] ? copy_mnt_ns+0xb30/0xb30 [ 631.933658] do_syscall_64+0x281/0x940 [ 631.937531] ? __do_page_fault+0xc90/0xc90 [ 631.941750] ? _raw_spin_unlock_irq+0x27/0x70 [ 631.946236] ? finish_task_switch+0x1c1/0x7e0 [ 631.950738] ? syscall_return_slowpath+0x550/0x550 [ 631.955662] ? syscall_return_slowpath+0x2ac/0x550 [ 631.960588] ? prepare_exit_to_usermode+0x350/0x350 [ 631.965592] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 631.970977] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 631.976342] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 631.981517] RIP: 0033:0x4548b9 [ 631.984696] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 631.992410] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 631.999673] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 632.006928] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 632.014190] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 12:28:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 632.021452] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/29 12:28:41 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x0, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f00000010c0)='./file0/file0\x00', &(0x7f0000001100)='./file0/file0\x00', &(0x7f0000001140)='fuseblk\x00', 0x80, &(0x7f0000001180)="6fc67b63aef226570c687ecea1aa3afe95f21843ce6e03fb65147271901c86ee9232cb8d1fb146ff22db1f2f91e18e99b1e61a885403d324a9846e257a39476bf0b3d0f63d5c6ed98ab639da61f2c3f40b1f103395268440a9c21e81c80656042cea4b1dba29c72a69defe1505730f78c7bb6a4aadc36177109d5903f3637e1d943eec33464c4326a73a15dc22b14439baceca53927ff3d5c2311513dad04c86225922d4263906181d51b5322f63e1") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x100000000ff, 0x81, 0x2, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x800000001182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffff7f, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) recvmsg(r1, &(0x7f00000017c0)={&(0x7f0000001240)=@ax25, 0x80, &(0x7f0000001680)=[{&(0x7f00000012c0)=""/196, 0xc4}, {&(0x7f00000013c0)=""/148, 0x94}, {&(0x7f0000001480)=""/220, 0xdc}, {&(0x7f0000001580)=""/24, 0x18}, {&(0x7f00000015c0)=""/173, 0xad}], 0x5, &(0x7f0000001700)=""/146, 0x92, 0x80}, 0x10020) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000b40)='./file0/file0/file0\x00', &(0x7f0000000b80)='./file0\x00', &(0x7f0000000c00)='f2fs\x00', 0x10000, &(0x7f0000000c40)="52aea3b8d2567b4d71381247b1c69c8166f9705631265639ef9f78d7384e04655ad72feccad35ea7185dbb2b892a8ef4bb0baecd8a02f2f979403127ef0a17088159207a2496") mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000002a00)='./file0/file0\x00', &(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)='vfat\x00', 0x20e90c0, 0x0) recvmsg(r4, &(0x7f00000029c0)={&(0x7f0000001800)=@pptp={0x0, 0x0, {0x0, @loopback}}, 0x80, &(0x7f0000002880)=[{&(0x7f0000001880)=""/4096, 0x1000}], 0x1, &(0x7f00000028c0)=""/238, 0xee, 0x8000}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) mkdir(&(0x7f0000000cc0)='./file0/file0/file0\x00', 0x88) recvmsg(r1, &(0x7f0000001080)={&(0x7f0000000d00)=@in6={0x0, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d80)=""/200, 0xc8}, {&(0x7f0000000e80)=""/68, 0x44}, {&(0x7f0000000f00)=""/30, 0x1e}, {&(0x7f0000000f40)=""/76, 0x4c}], 0x4, &(0x7f0000001000)=""/76, 0x4c, 0x100000001}, 0x10002) 2018/03/29 12:28:41 executing program 1 (fault-call:11 fault-nth:20): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0xfffdfffffffffffb) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 632.173547] FAULT_INJECTION: forcing a failure. [ 632.173547] name failslab, interval 1, probability 0, space 0, times 0 [ 632.184862] CPU: 1 PID: 692 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 632.191974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.201337] Call Trace: [ 632.203949] dump_stack+0x194/0x24d [ 632.207594] ? arch_local_irq_restore+0x53/0x53 [ 632.212274] ? kernel_text_address+0x102/0x140 [ 632.216888] should_fail+0x8c0/0xa40 [ 632.220617] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 632.225740] ? save_stack+0x43/0xd0 [ 632.229374] ? kasan_kmalloc+0xad/0xe0 [ 632.233266] ? __kmalloc+0x162/0x760 [ 632.236977] ? __list_lru_init+0xcf/0x750 [ 632.241120] ? find_held_lock+0x35/0x1d0 [ 632.245182] ? __lock_is_held+0xb6/0x140 [ 632.249236] ? check_same_owner+0x320/0x320 [ 632.253542] ? rcu_note_context_switch+0x710/0x710 [ 632.258463] should_failslab+0xec/0x120 [ 632.262432] kmem_cache_alloc_node_trace+0x5a/0x760 [ 632.267444] ? mark_held_locks+0xaf/0x100 [ 632.271589] ? __raw_spin_lock_init+0x1c/0x100 [ 632.276162] __kmalloc_node+0x33/0x70 [ 632.280387] kvmalloc_node+0x99/0xd0 [ 632.284097] __list_lru_init+0x5d5/0x750 [ 632.288158] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 632.294055] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 632.299096] ? lockdep_init_map+0x9/0x10 [ 632.303156] sget_userns+0x6b1/0xe40 [ 632.306859] ? set_anon_super+0x20/0x20 [ 632.310818] ? put_filp+0x90/0x90 [ 632.314262] ? destroy_unused_super.part.6+0xd0/0xd0 [ 632.319343] ? alloc_vfsmnt+0x762/0x9c0 [ 632.323324] ? path_lookupat+0x238/0xba0 [ 632.327381] ? mnt_free_id.isra.21+0x50/0x50 [ 632.331786] ? trace_hardirqs_off+0x10/0x10 [ 632.336097] ? putname+0xee/0x130 [ 632.339540] ? cap_capable+0x1b5/0x230 [ 632.343429] ? security_capable+0x8e/0xc0 [ 632.347559] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 632.352734] ? ns_capable_common+0xcf/0x160 [ 632.357069] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 632.362258] mount_ns+0x6d/0x190 [ 632.365615] rpc_mount+0x9e/0xd0 [ 632.368966] mount_fs+0x66/0x2d0 [ 632.372321] vfs_kern_mount.part.26+0xc6/0x4a0 [ 632.376893] ? may_umount+0xa0/0xa0 [ 632.380511] ? _raw_read_unlock+0x22/0x30 [ 632.384663] ? __get_fs_type+0x8a/0xc0 [ 632.388537] do_mount+0xea4/0x2bb0 [ 632.392062] ? __might_fault+0x110/0x1d0 [ 632.396128] ? copy_mount_string+0x40/0x40 [ 632.400355] ? check_same_owner+0x320/0x320 [ 632.404658] ? __check_object_size+0x8b/0x530 [ 632.409142] ? __might_sleep+0x95/0x190 [ 632.413105] ? kasan_check_write+0x14/0x20 [ 632.417333] ? _copy_from_user+0x99/0x110 [ 632.421480] ? memdup_user+0x5e/0x90 [ 632.425188] ? copy_mount_options+0x1f7/0x2e0 [ 632.429672] SyS_mount+0xab/0x120 [ 632.433106] ? copy_mnt_ns+0xb30/0xb30 [ 632.437003] do_syscall_64+0x281/0x940 [ 632.440878] ? __do_page_fault+0xc90/0xc90 [ 632.445094] ? _raw_spin_unlock_irq+0x27/0x70 [ 632.449577] ? finish_task_switch+0x1c1/0x7e0 [ 632.454058] ? syscall_return_slowpath+0x550/0x550 [ 632.458971] ? syscall_return_slowpath+0x2ac/0x550 [ 632.463885] ? prepare_exit_to_usermode+0x350/0x350 [ 632.468887] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 632.474249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.479088] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.484271] RIP: 0033:0x4548b9 [ 632.487441] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 632.495144] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 632.502415] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 632.509667] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 632.516916] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 12:28:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 1 (fault-call:11 fault-nth:21): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 632.524166] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/29 12:28:41 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) gettid() mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) socketpair(0x0, 0xa, 0x5, &(0x7f0000000580)) 2018/03/29 12:28:41 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:41 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 632.663881] FAULT_INJECTION: forcing a failure. [ 632.663881] name failslab, interval 1, probability 0, space 0, times 0 [ 632.675377] CPU: 0 PID: 727 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 632.682477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.691829] Call Trace: [ 632.694431] dump_stack+0x194/0x24d [ 632.698075] ? arch_local_irq_restore+0x53/0x53 [ 632.702753] ? rcutorture_record_progress+0x10/0x10 [ 632.708302] should_fail+0x8c0/0xa40 [ 632.712715] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 632.717820] ? __kernel_text_address+0xd/0x40 [ 632.722324] ? unwind_get_return_address+0x61/0xa0 [ 632.727277] ? find_held_lock+0x35/0x1d0 [ 632.731339] ? __lock_is_held+0xb6/0x140 [ 632.735421] ? check_same_owner+0x320/0x320 [ 632.739747] ? rcu_note_context_switch+0x710/0x710 [ 632.744685] should_failslab+0xec/0x120 [ 632.748651] kmem_cache_alloc_trace+0x4b/0x740 [ 632.753223] ? __kmalloc_node+0x33/0x70 [ 632.757188] ? __kmalloc_node+0x33/0x70 [ 632.761154] ? rcu_read_lock_sched_held+0x108/0x120 [ 632.766168] __memcg_init_list_lru_node+0x169/0x270 [ 632.771184] ? list_lru_add+0x7c0/0x7c0 [ 632.775151] ? __kmalloc_node+0x47/0x70 [ 632.779133] __list_lru_init+0x544/0x750 [ 632.783198] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 632.789080] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 632.794108] ? lockdep_init_map+0x9/0x10 [ 632.798169] sget_userns+0x6b1/0xe40 [ 632.801871] ? set_anon_super+0x20/0x20 [ 632.805846] ? put_filp+0x90/0x90 [ 632.809290] ? destroy_unused_super.part.6+0xd0/0xd0 [ 632.814380] ? alloc_vfsmnt+0x762/0x9c0 [ 632.818344] ? path_lookupat+0x238/0xba0 [ 632.822394] ? mnt_free_id.isra.21+0x50/0x50 [ 632.826803] ? trace_hardirqs_off+0x10/0x10 [ 632.831122] ? putname+0xee/0x130 [ 632.834576] ? cap_capable+0x1b5/0x230 [ 632.838465] ? security_capable+0x8e/0xc0 [ 632.842608] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 632.847787] ? ns_capable_common+0xcf/0x160 [ 632.852107] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 632.857284] mount_ns+0x6d/0x190 [ 632.860652] rpc_mount+0x9e/0xd0 [ 632.864016] mount_fs+0x66/0x2d0 [ 632.867382] vfs_kern_mount.part.26+0xc6/0x4a0 [ 632.871959] ? may_umount+0xa0/0xa0 [ 632.875578] ? _raw_read_unlock+0x22/0x30 [ 632.879728] ? __get_fs_type+0x8a/0xc0 [ 632.883624] do_mount+0xea4/0x2bb0 [ 632.887155] ? __might_fault+0x110/0x1d0 [ 632.891222] ? copy_mount_string+0x40/0x40 [ 632.895450] ? check_same_owner+0x320/0x320 [ 632.899774] ? __check_object_size+0x8b/0x530 [ 632.904274] ? __might_sleep+0x95/0x190 [ 632.908255] ? kasan_check_write+0x14/0x20 [ 632.912482] ? _copy_from_user+0x99/0x110 [ 632.916625] ? memdup_user+0x5e/0x90 [ 632.920332] ? copy_mount_options+0x1f7/0x2e0 [ 632.924837] SyS_mount+0xab/0x120 [ 632.928287] ? copy_mnt_ns+0xb30/0xb30 [ 632.932173] do_syscall_64+0x281/0x940 [ 632.936049] ? __do_page_fault+0xc90/0xc90 [ 632.940270] ? _raw_spin_unlock_irq+0x27/0x70 [ 632.944754] ? finish_task_switch+0x1c1/0x7e0 [ 632.949241] ? syscall_return_slowpath+0x550/0x550 [ 632.954165] ? syscall_return_slowpath+0x2ac/0x550 [ 632.959087] ? prepare_exit_to_usermode+0x350/0x350 [ 632.964096] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 632.969463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 632.974311] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 632.979491] RIP: 0033:0x4548b9 [ 632.982665] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 632.990364] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 632.997626] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 633.004902] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 633.012158] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 633.019418] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 633.474792] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 12:28:42 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:42 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x0, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:42 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:42 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000a00)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000000c00)=""/168, 0xa8}], 0x1, &(0x7f0000000cc0)=""/127, 0x7f, 0x9}, 0x40) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000740)='./file0/file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f00000009c0)='cpuset\x00', 0x200004, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:42 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:42 executing program 1 (fault-call:11 fault-nth:22): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:42 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b00)='./file0/file0\x00', &(0x7f0000000b40)='./file0/file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000b80)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000740)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5d6, 0x8, 0x0, 0x30, 0x22, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x43f, 0x8, 0x0, 0x6, 0x203, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000540)={r0, &(0x7f0000000500)="f5f424de5f3522a4f0d0432b575f7ef69fdf3514e5099cad0680616bd9a4fe1d69e3873f2a8577152453732a606a403cf4f4ebf89a", &(0x7f0000000dc0)="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", 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000580)="e43d91f100df605d4a2c4b53d1f857e1fcda1bc7331386866ba5c7bbc141aa8a70adca0ca3cc1f94d8f5ebf2650de9b5dce7c9c51f920111e21e7c6acc4a3f157c135ca23058eed58e485b3bf717ee665376f69eb9d58779b1ef908866e8b1e5ffb0bb250b5acb7cca6b1c11789ffdfee785883a8558c9dea1c24feac57d39ee", 0x80}], 0x1, &(0x7f0000000c00)=[{0xd0, 0x110, 0x9, "405a786e953ea185118b96da4df5af609d58db4acc713ca2140b311c65c8a24d9ebe4af061dc54b8872ed0cb904654166b7897030da2335e2cfbffdaecd85ba6da4ac34a1d00ce83816da6037947e2f3fe46f5a579e219bac7cc2612de9a07d8423f73d668431de0e7ae97abfa22d3b8e12e5964410ab6cb090176b4ad3af953241eeb59689117d2b7754189237bcbf451aad624422c1995458f5d7c658480ab3bcb390966f4bb5b8d6d1adcbceedce84e7182a127a10f2e150845"}, {0xf0, 0x119, 0x60, "d0a5db95061a20eaa2222b877e394789289c30a4d1f3d92ee31ef46a5b98eee3f9dc954c44cc0931767e7a5675a98f4b5f33e1284e8821bf8928a0b984c826f4d8642dee782bb9ff7badfbfed401102e3641fdddd9be9e4e89593d9f7051f8959dcfbdae600c7d69d099927b420de03409c4b314acaee181444a2b73633ba230532102d1b845555af8a4d3ddbe6a47c3f091e317757dab8d7a0a82e59f1c563aa1f0dfe3e14e4701bd6fa622e72449500bb81b170fb0a4e079aba175758034f1448b74d685d041b26a0918d949d2e41ea4817d54da15fa855d8cfb64f1edb0"}], 0x1c0, 0x24000000}, 0x8000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 633.553688] FAULT_INJECTION: forcing a failure. [ 633.553688] name failslab, interval 1, probability 0, space 0, times 0 [ 633.565010] CPU: 0 PID: 753 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 633.572121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.581473] Call Trace: [ 633.584058] dump_stack+0x194/0x24d [ 633.587670] ? arch_local_irq_restore+0x53/0x53 [ 633.592330] ? rcutorture_record_progress+0x10/0x10 [ 633.597352] should_fail+0x8c0/0xa40 [ 633.601063] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 633.606152] ? __kernel_text_address+0xd/0x40 [ 633.610640] ? unwind_get_return_address+0x61/0xa0 [ 633.615594] ? find_held_lock+0x35/0x1d0 [ 633.619647] ? __lock_is_held+0xb6/0x140 [ 633.623696] ? check_same_owner+0x320/0x320 [ 633.627999] ? rcu_note_context_switch+0x710/0x710 [ 633.632942] should_failslab+0xec/0x120 [ 633.636895] kmem_cache_alloc_trace+0x4b/0x740 [ 633.641460] ? __kmalloc_node+0x33/0x70 [ 633.645420] ? __kmalloc_node+0x33/0x70 [ 633.649387] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/29 12:28:42 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002080)="fc21510eeb0c8755565f7a7ae7f2fb8786b488e4876a8ab3c6aa6c32b797df9440293034224c9ceb255608860f366d11bba1c2a3a578208ce9e0609c17576568236d8aa3bd2067f7c595b39e3155296567860a3d8c3ef46cde0e4358f3cf16d89017be0e42a94bda24e425d3a37cce814ca2bd96d0f1b517cae0191c44270bfeabdde4f342740538c2b6dc81e81775de9253e2153dc22768283e54659a67b4d4b440932e4904cd1c39fac34e56d972fab16373261f4a4c34405ac424133168865f24c3ee451308ff74ad6cc02e159613c9ac486ddaa504da96f3bba666ed8c70dacb1b5250663c2c10a1afba0196371772205ae1", 0xf4}, {&(0x7f0000002d40)="8e1b1663a9bcd14bdadf8829cd410c6499d6b82472e06a9672f124b366a4713b81ed2548ba11155fbaf236e26aee98a8547e65d43541cdfd4d609c8699203004f592dfbe419eede7533946694df975eb8ccf8d8821552a9fdfcce6cdc017852bd88d379d5bbfda9b0ab4a37e025eb45f877548d3b171cf1794489cab0d2ced737ae7a04d85773955017d1fa08bbf89e315b25bc01f2f87b8fac9515834a3a46329f313f02e50622ffb57667f936e2b8bb51718c51131d351af0c24f9e65e63fef97a463f75ca3ce094b0246236c49ebe63ea2467530320751bb5175bf90a76ac25a4c6825850adc72e31cc375eb5ebc95bbc17bef7ec53b01603435a02277e5dd8007cfeedd7f6ae99d99ae69aad457daaa3150b606a95a8029f46b764f18df3b49358695655085a78145bac108567cf6704e3bb24ae21085b7d6523635f2b8da4494cdb4c11d07d6a10dff72d089839ffa295797d76293609c5cf63fddddd3b317344bdbd834cca93dced38dbab240d812fecb11743b1d52391692b628ac83f124e1fb4056808aeabd571ccdf2f79895ea03da8d395aea766bd1fe2443137aa6fff92bb5c3686ec211d37dcfcf1c40b5bee88c78e5fa68b9462dd71bd20ad1ff793255b1d0400e92a4024e2082907afd91d5e6b1318460b62e152e2f807b653d62dcb3e83982a2c73c792fb4f3c7e7ce5e85ba303406822a6c085ae4c9b78123184fb6c2492530784ca44d7884b2b4b7a12fa3f4c43b169a84a3d0d0db9f792b1ebfed92f739bfd2f61c30aa5a90595f22941c42a856a9f6d41c1a319eb2b6caafef89e618a9cad7835488075b3c668bab5eafb964ea80795dc3139d92ad4275515063e354ec1031591ee9da50a417711ea98b79d281abebcb88f54dc4ce7a5faa777a6c22ca36cc75973d319fa321cbd772354f5d366560f485b0bec10346e1c3d5e7e46c17c01e1ad266ddbba1cc379fd87b31187d666b807ebf8f3811d9c98928be48768fbb04038e0e0cf717f35953f67d7ccec1b9531c7eb310ff59c8197796be4e34c6e48888281dea282eacb0531eeea6d0b5125f5c51fc69ff4a0a86ff8d889f36570637a0c40181d78272d294a4a0c9df7e40314a9c42a35ec4a24c6c1526f0a89234519cdad74d2ab785b7cd65252dc50e9b7b246bdbd141c562b3ab9ab9915d84c99d03a791f5905b48728c1bcef8ab53bb2b1bc904aa8f4119f6836b4d7d38dfd41e02fc3cbe71fa77fcb6b2166a9cbf6c4a25c48538f32fdf60a6953ef0da68292d31764a0d9441c4eaade629b55e435fee92d7dd7334588d7650a536f66c651d066ee40891385493311b1b7dbf56ff785c7b010244ab8f54e37beba45375d526943a640c7a3178f9ecb8544a328383d1e42a964436b98b09183b4f36d3fd59bc76aa394cb61887ffb21d4213f7a92f3d405a864c50fd92c5aca97ed4b21f4f773432da11bb864fffc97f7c066e99af105c5587efd38ca981ec14fa567109ee10e43388bcc533d9c2342252c6588509486276cb0a57b88ff4f884814d6eb077c5d7e45420dfa93983c13965caeda7dfbf25a55e9c6bbd118e60b232de082debcc07df5941996d3408cb26376011b85f6a68c1e3dd184deb1586aca4450da45c826256666eefd95c8ef1f4b2e7e747846f0d494bb7e8c04b0c74ca27cc426f192ad3432aef38af9ad438d5005e9be0ecde6ad972819b3e8ad9e4918f0ed29b7720d17b64eb62e8c2f0738d076586d521b0f21d2fa1c148bbd8a45422c07cfcba50578b67d7e3e9eb46e09a709e940a52baa10c5af81db96f79c3980536800f794d4812b153f802c9da657524bfed3f75bb07a2e25959dd500988f22dc47cfe54a313da6384d6fb8002d5d282672542c3313d52f6a9bc2f0be339dae0a10b2f6981d08a94a522866530481763382e13d2d72239e0be2019a3b0835eb1f50144be075ff9a6e063ee2fe4230552fcad866e2d169411fca06e0f8074d04d3808a3ecb10743a920f7cfd3a2e2ebd1c21a0c4fc7b6de3247a0b54c003a9cae54356c111162a4db31584408bd9880992077961a3436ac47d56e79b9816794128d976bb50ae1671620f385a68780a6a7e99b8207b15695f09dee92b833a718cbf83fff0e5ee278673d36131d96768a8de81eb05c98e33f58db0c3c7761a785d166faf91769199504ec30724c9084ef05c48d7f87d5b85925060f8757ad4641298835b25619e56baf5c9ad2d73cc1ed3c604800d048ddba2eaa4e5204984e151966647f0f49db769facc2442ebe008beed85a2a6cb9ec56d6f5a2c54c01e9c6ec25477d9b0709fc5bac3460196d2fff55209ea0550a6cd7d98a7d1d600c091d6bd4068b975250af50e7307a2033a2c7a6a5cd11ec5f27c24df0d987b4cc276439308291c227bc0b0f01e0ea490d4990679c0c051b46c6c13136fe69c2797fcb5ea14e536212038fedd132a28284a7af043435e6d61ddcd5342e6eeeab3d2424ebb59de8047a17ccf4d0773b21ba2869f0b33fb45e0b983e20500d711f8260ae56c04727db3fdc1e2e817aa710a036b7e46d57d7d782428c16902abb4c313203edd85ff4a059412d4497eec287cb3a4db6b05d57734837150d70a546ab7b90f4ada95cf25137c43592028429a8e532beb3bd60b739a046266ead5621bde25615b27ee7c377b4dc9daadef86c9fb1871e86d954cd28a2a9fc55b5799479925f5db3d22ee35378d4c06cb075fd1035ee8b848126d9ccc4a557491d163c6d6a0e8378a1c526a3bce9bc7770873ec80cd39a9c67545568f4519cc92f1b949acc5bfb8568d0ba1c7b406db195151e5de58ed2c80c27bc7078b6258c9e3f4222f754f4e70cd82297dd5175f63bfe42818e1905f705b1edbfbb484a04a595c34b5c56d6be361f50d5b0a0737f88a4163ea80309cece66616c11dc23e38d0b3428884459458bd90ce2c8e958bd1a25c132dcd7d9fd896a67b606ef31cb232aa6f62ee3f635e6af6ba665b0ae524393b2ed11f61edcbc69b99b44672d00ae4f0b9b507b0425aea6881053454b129f1fa2b242c15bda4ffe6fa9201df1a3aa564009d602b096bc9baad70e0e5958f08850d14b8f9bbe0bd2ff2c2132f36abb127a955e5b07e1e8f02613983b44f40b5134ea7de5fd6bc2dc21d08013b0a21a35c340a1c3cfbfe3d4ff5c72e0bd38fd9f34f1cacbb12c241935b4794329f82eb2852a5702eab6de97cf0ed128070ccd086f75d5cefb9aa42ec481cfafaf76cfb3b30eb8f2524689a784056bc6575be58fdec084ecbe62ba3b3a979c81d1ba6de2668fae7361ab1d11c8736fa1c9f5263f9db8d027488d8b72bf2abf9e2d872c08c0fe66f1c38f9b717ee1cdc3e412325e5c612e98d4a975aafd674e93e0fe5fc4a3355db04cef23d444e9675285be8b455fbbc2186f717d868e0a62ef6beb3d5a6be3e456bf343a44aec8ea4d5299926cee1b3423b960f4040ef30e131bd9fe4723cc62302d451afe3436f056c505fed4cb6fc81d0eb552a039d669bea9e25a2d1f273083a87c539643d6ad2dbe8f9a86d584d7b05aa914a0fd92066f4662b29218c751288f834b076cae9949bfda7e1bd2bb18e2977bdda85493b428612412f975c9846947ad6fcac2816b7c272ffe0e7bbfe2538eb99adf107867088f86777a2a9b2c807217437447a5e7fa3376df7c405c1e714b7dd2c9924139953e58346852851dc51e5565be0a8c8c358459756e8a4f176cf8d94179213a3a07d889b7f5a9a8b7f5470ac8d670be07b203699265f35b38578f0b45854056b59b4612c9bf6de8002b5dfb5a7a6946f3bb9c76010e8d38cbce54389ea1faa5b82c0875c439631cff3a5990105fba74b3ac656f6da13445c2811cd9aec48978ae2d5763450a701beadc32ad6bdac08d1ba4d13901fcef51e89c5de86ac33f73e4aec158e5ea80ab8798570734cf880b906fb836eb03635456fce68b664a339dd19ca46afce8b1311610d4806c03cbfcdef92c7c7557e3e3bf81d51a8981ab42952c2e3165c15f2d83b213728e8a3b836924318d15ac7bf556edac96307928c0f901f2522954a6a76f09281a1591d863694091fb6093ee2854096fb2742a3fda3c3bac541d287d433169b37280d58e9cf08163be1986c62e8576680146036e0d4fd96c715c08f5a1deaa029c2d1e08aff87f807c4257784e0f58a8d96e09a528d51132b87ec20cf42a9f5dffba1d83b8799c4e4ad410aa81a5d3e3df4b1db6f91894aab52410d682060f7040bdf3bdf0db33dbe2b8a4b642245a4da023e9d5236c87801e836de0d3b8a7d0883d098c29c1473853c5c405c4cf31094b1b43b2861ebc49b68e1ecfd594743201799a7133e4a692a34fb858794e14c6272095da25bb78eb76a9847f246757fe28a0cd68587053abc8b83b4636edde5b28138c2c31e2bf86f41f3e73dd1dd660e7ad9d27b20aa8ec607dfc1fbf8a067505b26a258c9bda64b4e4d65d7291aba6cf8d46bbab46535baa6298e85f96c0234e41914df5957007db383411f2af079dbb759db9460773504bfd9c6504131a17d565bf6f323526d7b4e4a4ec86032dae1e976896215e697ab8170911246123789f78eb47bdc04215f6408db96286fceeaca5bbdbbebb2c0e4d2b177c1ed9851ac5c5fe4a638c21569592168cb66d8245982a9d20c8def8fd911d10a6bca20ce07f2a27af3445d9ccfc9d38d0f50f28d1199ad5b87632841ba757b2549256b15de0d603132f514c19d7adbfc4434570c221f1e122f5da8cb1fd7398e667c0b54058ebe0415cf731ac91a348d6cdcf34e59fe79b87cca1aaf671f77282caca0451c731e12af94ebf13d9593f2d25c05e86e1098e670475b856da1cd8ba1cf466b62051289940c77494b16bc1b67c11aa42a1d88d14b719d6fd2d87b42978d05badce34ae5ea257f9d579909443c40d4b242d774e22c872d7123858d2dd409f72d02238c742c25d0abd97e0844c528e1495f964f778383f34002f7d06ac4ed8fefe24b013b91b98279d5a5610b95ac8dc2147d3deae42e31cada8fd1a649c0f166ba3a1cfc605ea11a17c532a04c14bf00c9a8cade018c08414a11d47ba86d8e3081c3751dec10aed493fc83e345a91d7021bd48403fe532d2ec28c63f1f8ad9320f60bd7148f7d5a9b355b546c9f1f913d8d62780a02a43f957255a91da60ed87ff0d3aa21a678eb517480c748273efc05db61a3151fafe1525391b1a87b3a9685b786e3a4127d612ef06e9bfd1164e28f66fdc9710994733d4ceca1f8945a7cd2662df4bf0766a0cb1c5bfb81475f31334b6b5c60595b345a5375a053cdda8250e697accabea2e79c070ea6456eec36425d78e4628925a8a52020d8e3e322b162e78ab2fd0db8470f38639ef95b5676aa73c26969b08ee8638af6bb14dc64d0b196f73300e369cad1824dd9a077b9bd24f31c47e1246f64d9c885744e75f4b49f7575c46bb06ae68a552ed6aa4173b79fadc8030089ed193a6457445d1defbc9cc80a1ee7901fa9c2c0e9091a6f7ae33b4b833caff3787aebb855f2011eabf01057b511ac5fdc613c22ab36ae2cdeefe21ad69c10642a9482b926e559aee89cdcdbee74d2665bb9c9001355f4fdec0cc887a8a9d98e9f2f5e92994503cdc6b54b7b473f26784b4104d095c37fc7c9300cca01b5b150a25d12c28edec65b4bb108652c8655af187f1db382a2c6242c51635a74fea14066f9b1b8dfb8b339d592669386023539fdba6a10e1d745059d65533b64af7a06d4b56496fc8d17d9a6f434df22111bb1aa6461f42f3a8f22279", 0x1000}, {&(0x7f0000002180)="8d52a0b83ca8bf32a552b1a3fea89ef6dba5f1a4e2f2cfcca5cd1d6dc8a9abe046cedfcaae46b15f76bdb15833071ec5fb1811ea8a18a738075109f15fa00f460a6b861daaccd42bfdb4d952975e696dd0b49329a0529f74ee25ac35d0ea88a9d05952a7cd3f102496a65cd770fd70c196ca56d2b5173d45ae76b4ffb75eaa8b15fe26325838a7c4564055e92911cf2c45ebd2956e93a64b9f705d4136f0432ade35141cab7d0c36a89b3798e904930e074235c3a3bf3d1a389d7060557419c6a1831a5f5907ac2af653b1e00bab208fa3e29011eb195fa1044dcda282c54f9646d0", 0xe2}, {&(0x7f0000002280)="9ad2b0756b2da6baf727fcb813023a6e0a7afc1b0828dd4671aea4f902b827a76e604c7d7a4730859b4788fa5c5afd8be6b669301d0aa89f6762ce758522ce83ff6d44d1d9330b4f98ded8248c769fba4e1f3a3799665267bf9daf5aeb91b31ad9115056a3b99fcf3f6ab97fba3a79bcb957e5f90898bb55ed6aad9a324fc7da1feeee27cc330d0c811ae1df061615585636e56311014a7313eaf74d41c7d2f5a348bd83b9f44792fb812b2b2c0478282cf564b554e8e74d985cc58860", 0xbd}, {&(0x7f0000002340)="0a1d1c4f2babc081470037f5be7bf8fa12e3bf4037ea127d0487e7254078c849776cecebcf888e385ee92341d7aeeea97f1af597ad6056a390a0d7339a19417a7a04e0038936548aaa0ed77c040a3837f571aa20b9d2a329234df8f39cd36f184494dca62509f48d91018135f6c26712182e5f3b84a8a6a9734bb17d2f4a466f04fa82d1f72ca83d46f98dcc06d5a8756e5ea50e52ef4e836526ee128f6e83160d06a468a9006ae3edd603eba17cfd4dcec01f31924a4cacc149d04d47d15bf3b66579898b4bba3bb9fd8b60894023f3a9ccefba93f5e9a0d5b52dfa28aee6e0c39f08955b20c35a7d7b", 0xea}, {&(0x7f0000002440)="f36553b25d0d4a80c5d4c2e5a7320ac73596b22122f50120626a2e3a7eab01ca963cf4398b5cbc913d5158f6523288e0c618cea0c851f3e3d7dd46eaee01f7a9bc0ace9bff8eaa3299453c8eefbc93ae57d6d52102b8c2b9eeeeb540cca16f047886ecd6e80eaa2ca2f99396c09a52015a391e54e3737ee0c854093c1227e106fadf0932bb04d1f6dfc27955e2061b48d67addc76c1fdb8a32d85987b51e6b402011db585a1d5a24d645f94bc00b49", 0xaf}, {&(0x7f0000002500)="d647660f400e1a7a8096087b8c22a72691a9", 0x12}, {&(0x7f0000002540)="8702c071d1deb0549b7afdee59a3a4bb2f0c9dabd97bd24708d1caa9a1cfe6d96c", 0x21}, {&(0x7f0000004d40)="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", 0x1000}], 0x9, &(0x7f0000001f80)=ANY=[@ANYRES32=r2, @ANYPTR64=&(0x7f0000000cc0)=ANY=[@ANYPTR=&(0x7f0000000740)=ANY=[@ANYPTR], @ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYPTR, @ANYBLOB="d9f436a385583475677a4675535a274f7d6fe93130f43dd07ce9b88021e4c6faad1a0c8b11647fedecac0407f170b28e1e03b80baf0e3297a5dd5e4a6a3b42266333aee3dd165f30d43ec0a17a0656b9900a9dfc5b495a9d68c9362b9310fa5f246bc2", @ANYRES32=r2]], @ANYRES16=r0, @ANYRES64=r3, @ANYRES32=r0, @ANYPTR64=&(0x7f0000001e40)=ANY=[@ANYPTR64=&(0x7f0000000d00)=ANY=[@ANYRES16=r3, @ANYRES16=r2, @ANYBLOB="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", @ANYBLOB, @ANYRES64=r2, @ANYPTR64, @ANYRES16=r2, @ANYPTR64, @ANYPTR], @ANYRES32=r3, @ANYPTR=&(0x7f0000001d40)=ANY=[@ANYBLOB="108afa7c7cdf08a765cf72ff3614ace24489baa766055edb86545d15121cb6a52212154f9666b7372478d4b610723dfdb035347c522fb7455263507465d0f15b979a77c8f7ae5cb665b320eaf4b10d8ad49a46b58007456feffce2a9f6f398ea9667d71ccc35aeac37d24513af019e40f48e8788667daa528ce26eb7253fd7c60b3b6ab58b3e177c5477d24980dbf5a22e7623c431c31bf56edf30d19bc529a15266b185ae9d53e901f31323fc43f63e156a73d3be53ac56bfb021b5eddb2d7774e047e3e1"], @ANYRES32=r0, @ANYRES32=r3, @ANYRES64=r0, @ANYRES16=r0], @ANYBLOB="ca35b5f5ad29057a06ed8aba3e2ab0d251779f189ef026f93ffc62ea4d90fcd5468867119cc70dabe4ec99199ab96eb16d7eefb6b73d270430ad4a2877d37f360c2c0d71c44fed4b273cac02a2827479526480de15faf4fcc1d8d7b7c5672f3b244be650f982b131e228f0e1a169885d1ec25e2b83f695dcf30ff3fbc373ed80f43df5fcf4cd7678dc8fb06cc27e5ba76e7808faad039abe358a482172961d948fe3c546e7"], 0xc7, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) sendmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000580)="1789ed76b7bca2dfc866336662559cd7eae2dcd939d816c488c9f066f4edfebfa27b93c7bda4a65577c2d7e48a34a9d2219a87a5e6d2428f7408d3f6c42a59e14828ba3adfe8baa220", 0x49}, {&(0x7f0000000700)='A', 0x1}, {&(0x7f0000000740)}], 0x3, &(0x7f0000002640)=ANY=[@ANYBLOB="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"], 0x100, 0xc040}, 0x20000000) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 633.654419] __memcg_init_list_lru_node+0x169/0x270 [ 633.659432] ? list_lru_add+0x7c0/0x7c0 [ 633.663387] ? __kmalloc_node+0x47/0x70 [ 633.667348] __list_lru_init+0x544/0x750 [ 633.671413] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 633.677304] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 633.682341] ? lockdep_init_map+0x9/0x10 [ 633.686411] sget_userns+0x6b1/0xe40 [ 633.690121] ? set_anon_super+0x20/0x20 [ 633.694104] ? put_filp+0x90/0x90 [ 633.697556] ? destroy_unused_super.part.6+0xd0/0xd0 [ 633.702663] ? alloc_vfsmnt+0x762/0x9c0 [ 633.706632] ? path_lookupat+0x238/0xba0 [ 633.710684] ? mnt_free_id.isra.21+0x50/0x50 [ 633.715091] ? trace_hardirqs_off+0x10/0x10 [ 633.719401] ? putname+0xee/0x130 [ 633.722839] ? cap_capable+0x1b5/0x230 [ 633.726717] ? security_capable+0x8e/0xc0 [ 633.730856] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 633.736041] ? ns_capable_common+0xcf/0x160 [ 633.740356] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 633.745533] mount_ns+0x6d/0x190 [ 633.748896] rpc_mount+0x9e/0xd0 [ 633.752277] mount_fs+0x66/0x2d0 [ 633.755645] vfs_kern_mount.part.26+0xc6/0x4a0 [ 633.760222] ? may_umount+0xa0/0xa0 [ 633.763833] ? _raw_read_unlock+0x22/0x30 [ 633.767974] ? __get_fs_type+0x8a/0xc0 [ 633.771849] do_mount+0xea4/0x2bb0 [ 633.775372] ? __might_fault+0x110/0x1d0 [ 633.779419] ? copy_mount_string+0x40/0x40 [ 633.783642] ? check_same_owner+0x320/0x320 [ 633.787950] ? __check_object_size+0x8b/0x530 [ 633.792786] ? __might_sleep+0x95/0x190 [ 633.796751] ? kasan_check_write+0x14/0x20 [ 633.800971] ? _copy_from_user+0x99/0x110 [ 633.805118] ? memdup_user+0x5e/0x90 [ 633.808813] ? copy_mount_options+0x1f7/0x2e0 [ 633.813291] SyS_mount+0xab/0x120 [ 633.816721] ? copy_mnt_ns+0xb30/0xb30 [ 633.820600] do_syscall_64+0x281/0x940 [ 633.824469] ? __do_page_fault+0xc90/0xc90 [ 633.828680] ? _raw_spin_unlock_irq+0x27/0x70 [ 633.833151] ? finish_task_switch+0x1c1/0x7e0 [ 633.837626] ? syscall_return_slowpath+0x550/0x550 [ 633.842546] ? syscall_return_slowpath+0x2ac/0x550 [ 633.847458] ? prepare_exit_to_usermode+0x350/0x350 [ 633.852462] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 633.857822] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 633.862650] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 633.867818] RIP: 0033:0x4548b9 [ 633.870982] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 633.879107] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 633.886366] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 633.893621] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 12:28:43 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0xc) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e78, 0x5, 0x2, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') r4 = gettid() perf_event_open(&(0x7f0000000740)={0x0, 0x70, 0x5, 0x7, 0x7ff, 0xd4, 0x0, 0xfffffffffffffffb, 0x82, 0x2, 0x7fffffff, 0xbc, 0x2, 0xff, 0x10, 0x4a28, 0x7f, 0x2, 0x2, 0x9, 0x6, 0x6, 0x81, 0x5, 0x3, 0x3f, 0xaf, 0x6, 0x8, 0x1, 0x5, 0x3, 0x8, 0x80000000, 0xe726, 0x4, 0x6, 0x4000000, 0x0, 0x8, 0x3, @perf_bp={&(0x7f0000000700), 0x1}, 0x400, 0x6a, 0x80000000, 0x0, 0x401, 0x1f}, r4, 0x2, r2, 0x1) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000005c0)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000b00)='minix\x00', 0xffe, &(0x7f0000000c40)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000004000000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 633.900880] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 633.908139] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/29 12:28:43 executing program 1 (fault-call:11 fault-nth:23): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 634.012325] FAULT_INJECTION: forcing a failure. [ 634.012325] name failslab, interval 1, probability 0, space 0, times 0 [ 634.023668] CPU: 0 PID: 782 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 634.030765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.040111] Call Trace: [ 634.042697] dump_stack+0x194/0x24d [ 634.046332] ? arch_local_irq_restore+0x53/0x53 [ 634.050991] ? __save_stack_trace+0x7e/0xd0 [ 634.055312] should_fail+0x8c0/0xa40 [ 634.059016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 634.064110] ? kasan_kmalloc+0xad/0xe0 [ 634.067985] ? kmem_cache_alloc_trace+0x136/0x740 [ 634.072817] ? __memcg_init_list_lru_node+0x169/0x270 [ 634.078009] ? __list_lru_init+0x544/0x750 [ 634.082237] ? sget_userns+0x6b1/0xe40 [ 634.086122] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 634.090855] ? do_mount+0xea4/0x2bb0 [ 634.094551] ? SyS_mount+0xab/0x120 [ 634.098157] ? do_syscall_64+0x281/0x940 [ 634.102200] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.107561] ? find_held_lock+0x35/0x1d0 [ 634.111626] ? __lock_is_held+0xb6/0x140 [ 634.115689] ? check_same_owner+0x320/0x320 [ 634.119995] ? rcu_note_context_switch+0x710/0x710 [ 634.124917] should_failslab+0xec/0x120 [ 634.128868] kmem_cache_alloc_trace+0x4b/0x740 [ 634.133429] ? __kmalloc_node+0x33/0x70 [ 634.137385] ? __kmalloc_node+0x33/0x70 [ 634.141341] ? rcu_read_lock_sched_held+0x108/0x120 [ 634.146354] __memcg_init_list_lru_node+0x169/0x270 [ 634.151367] ? list_lru_add+0x7c0/0x7c0 [ 634.155325] ? __kmalloc_node+0x47/0x70 2018/03/29 12:28:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 634.159297] __list_lru_init+0x544/0x750 [ 634.163361] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 634.169238] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 634.174243] ? lockdep_init_map+0x9/0x10 [ 634.178298] sget_userns+0x6b1/0xe40 [ 634.181997] ? set_anon_super+0x20/0x20 [ 634.185962] ? put_filp+0x90/0x90 [ 634.189392] ? destroy_unused_super.part.6+0xd0/0xd0 [ 634.194476] ? alloc_vfsmnt+0x762/0x9c0 [ 634.198429] ? path_lookupat+0x238/0xba0 [ 634.202484] ? mnt_free_id.isra.21+0x50/0x50 [ 634.206892] ? trace_hardirqs_off+0x10/0x10 [ 634.211195] ? putname+0xee/0x130 [ 634.214630] ? cap_capable+0x1b5/0x230 [ 634.218525] ? security_capable+0x8e/0xc0 [ 634.222686] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 634.227885] ? ns_capable_common+0xcf/0x160 [ 634.232214] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 634.237424] mount_ns+0x6d/0x190 [ 634.240811] rpc_mount+0x9e/0xd0 [ 634.244176] mount_fs+0x66/0x2d0 [ 634.247542] vfs_kern_mount.part.26+0xc6/0x4a0 [ 634.252114] ? may_umount+0xa0/0xa0 [ 634.255720] ? _raw_read_unlock+0x22/0x30 [ 634.259847] ? __get_fs_type+0x8a/0xc0 [ 634.263717] do_mount+0xea4/0x2bb0 [ 634.267238] ? __might_fault+0x110/0x1d0 [ 634.271302] ? copy_mount_string+0x40/0x40 [ 634.275519] ? check_same_owner+0x320/0x320 [ 634.279830] ? __check_object_size+0x8b/0x530 [ 634.284315] ? __might_sleep+0x95/0x190 [ 634.288276] ? kasan_check_write+0x14/0x20 [ 634.292491] ? _copy_from_user+0x99/0x110 [ 634.296625] ? memdup_user+0x5e/0x90 [ 634.300318] ? copy_mount_options+0x1f7/0x2e0 [ 634.304808] SyS_mount+0xab/0x120 [ 634.308257] ? copy_mnt_ns+0xb30/0xb30 [ 634.312127] do_syscall_64+0x281/0x940 [ 634.315990] ? __do_page_fault+0xc90/0xc90 [ 634.320204] ? _raw_spin_unlock_irq+0x27/0x70 [ 634.324681] ? finish_task_switch+0x1c1/0x7e0 [ 634.329171] ? syscall_return_slowpath+0x550/0x550 [ 634.334088] ? syscall_return_slowpath+0x2ac/0x550 [ 634.339017] ? prepare_exit_to_usermode+0x350/0x350 [ 634.344035] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 634.349388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.354221] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.359391] RIP: 0033:0x4548b9 [ 634.362558] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 634.370248] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 634.377506] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 634.384785] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 634.392049] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 634.399304] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/29 12:28:43 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00'}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:43 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000700)='devtmpfs\x00', 0x4, &(0x7f0000000ac0)="f2d52b8372d658d8092462600aeb3839e8e4a75f0748fe29635bb7cecd5488a75bc057cdd250fc6798baf82d4fc00916d0792922623f12926683bd546ec0ef18e35f514e01fac6b28af6207f4a098ef7d282fc4592be32aa3aecae83aa44b197bb6830aca0b89c6934b2fd693ddb7fe131cd2d87f86fe10998273e6a3501dec7bc1976b5099a9739b07426896621d2ad529aaa1b3649811ab0159304727fd2b8509617a9bb1a99e360aaebcf08b1f54495c43d8b82ef2b9e15052811da727af191e6") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000240)='./file0/file0\x00', r0}, 0xffffffffffffff30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:43 executing program 1 (fault-call:11 fault-nth:24): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:43 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 634.495751] FAULT_INJECTION: forcing a failure. [ 634.495751] name failslab, interval 1, probability 0, space 0, times 0 [ 634.507194] CPU: 0 PID: 801 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 634.514308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.523672] Call Trace: [ 634.526272] dump_stack+0x194/0x24d [ 634.529914] ? arch_local_irq_restore+0x53/0x53 [ 634.534595] ? __save_stack_trace+0x7e/0xd0 [ 634.538948] should_fail+0x8c0/0xa40 [ 634.542685] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 634.547778] ? kasan_kmalloc+0xad/0xe0 [ 634.551653] ? kmem_cache_alloc_trace+0x136/0x740 [ 634.556485] ? __memcg_init_list_lru_node+0x169/0x270 [ 634.561664] ? __list_lru_init+0x544/0x750 [ 634.565891] ? sget_userns+0x6b1/0xe40 [ 634.569777] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 634.574514] ? do_mount+0xea4/0x2bb0 [ 634.578223] ? SyS_mount+0xab/0x120 [ 634.581833] ? do_syscall_64+0x281/0x940 [ 634.585883] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.591238] ? find_held_lock+0x35/0x1d0 [ 634.595372] ? __lock_is_held+0xb6/0x140 [ 634.599426] ? check_same_owner+0x320/0x320 [ 634.603738] ? rcu_note_context_switch+0x710/0x710 [ 634.608671] should_failslab+0xec/0x120 [ 634.612629] kmem_cache_alloc_trace+0x4b/0x740 [ 634.617193] ? __kmalloc_node+0x33/0x70 [ 634.621162] ? __kmalloc_node+0x33/0x70 [ 634.625130] ? rcu_read_lock_sched_held+0x108/0x120 [ 634.630142] __memcg_init_list_lru_node+0x169/0x270 [ 634.635146] ? list_lru_add+0x7c0/0x7c0 [ 634.639097] ? __kmalloc_node+0x47/0x70 [ 634.643073] __list_lru_init+0x544/0x750 [ 634.647126] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 634.652999] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 634.658022] ? lockdep_init_map+0x9/0x10 [ 634.662086] sget_userns+0x6b1/0xe40 [ 634.665790] ? set_anon_super+0x20/0x20 [ 634.669773] ? put_filp+0x90/0x90 [ 634.673220] ? destroy_unused_super.part.6+0xd0/0xd0 [ 634.678320] ? alloc_vfsmnt+0x762/0x9c0 [ 634.682278] ? path_lookupat+0x238/0xba0 [ 634.686327] ? mnt_free_id.isra.21+0x50/0x50 [ 634.690730] ? trace_hardirqs_off+0x10/0x10 [ 634.695048] ? putname+0xee/0x130 [ 634.698496] ? cap_capable+0x1b5/0x230 [ 634.702374] ? security_capable+0x8e/0xc0 [ 634.707147] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 634.712334] ? ns_capable_common+0xcf/0x160 [ 634.716666] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 634.721844] mount_ns+0x6d/0x190 [ 634.725201] rpc_mount+0x9e/0xd0 [ 634.728569] mount_fs+0x66/0x2d0 [ 634.731928] vfs_kern_mount.part.26+0xc6/0x4a0 [ 634.736503] ? may_umount+0xa0/0xa0 [ 634.740114] ? _raw_read_unlock+0x22/0x30 [ 634.744420] ? __get_fs_type+0x8a/0xc0 [ 634.748305] do_mount+0xea4/0x2bb0 [ 634.751825] ? __might_fault+0x110/0x1d0 [ 634.755910] ? copy_mount_string+0x40/0x40 [ 634.760153] ? check_same_owner+0x320/0x320 [ 634.764471] ? __check_object_size+0x8b/0x530 [ 634.768971] ? __might_sleep+0x95/0x190 [ 634.772939] ? kasan_check_write+0x14/0x20 [ 634.777164] ? _copy_from_user+0x99/0x110 [ 634.781302] ? memdup_user+0x5e/0x90 [ 634.784997] ? copy_mount_options+0x1f7/0x2e0 [ 634.789485] SyS_mount+0xab/0x120 [ 634.792929] ? copy_mnt_ns+0xb30/0xb30 [ 634.796810] do_syscall_64+0x281/0x940 [ 634.800677] ? __do_page_fault+0xc90/0xc90 [ 634.804902] ? _raw_spin_unlock_irq+0x27/0x70 [ 634.809382] ? finish_task_switch+0x1c1/0x7e0 [ 634.813866] ? syscall_return_slowpath+0x550/0x550 [ 634.818787] ? syscall_return_slowpath+0x2ac/0x550 [ 634.823695] ? prepare_exit_to_usermode+0x350/0x350 [ 634.828698] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 634.834226] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 634.839069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 634.844250] RIP: 0033:0x4548b9 2018/03/29 12:28:43 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ef411dcc16f4f5e3821f842d13875bb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c80000000000000000000000000000") [ 634.847428] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 634.855128] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 634.862390] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 634.869643] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 634.876894] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 634.884153] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/29 12:28:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:44 executing program 1 (fault-call:11 fault-nth:25): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 634.898316] tmpfs: Bad mount option òÕ+ƒrÖXØ $b` [ 634.898316] ë89èä§_Hþ)c[·ÎÍTˆ§[ÀWÍÒPüg˜ºø-OÀ Ðy)"b?’fƒ½TnÀïã_QNúƲŠö J Ž÷Ò‚üE’¾2ª:쮃ªD±—»h0¬ ¸œi4²ýi [ 634.932948] tmpfs: Bad mount option òÕ+ƒrÖXØ $b` [ 634.932948] ë89èä§_Hþ)c[·ÎÍTˆ§[ÀWÍÒPüg˜ºø-OÀ Ðy)"b?’fƒ½TnÀïã_QNúƲŠö J Ž÷Ò‚üE’¾2ª:쮃ªD±—»h0¬ ¸œi4²ýi 2018/03/29 12:28:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) sendmsg$kcm(r1, &(0x7f0000000b80)={&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @multicast1=0xe0000001}, 0x1, 0x3, 0x4, 0x1}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000180)="2b295d008d46c75b1618574c1898f0945635b993b88a31034d8ccd7d", 0x1c}, {&(0x7f0000000480)="396f2862d3f2db114e59728ad07cc836a1cffbb5ec257922e0a7d8e44fb2d700a52ee978733d2bc1bdfa62f02193cc8da09214a7ee7654760d9096b96805", 0x3e}, {&(0x7f0000000ac0)="5a25b8bc3d7e2f2755fbe3b5d0040097ce29aa750049b78424e4c64ebc634d1f731b1d755bf9c6ddc18bb1ea03904a4512e74e2ee210b5516fb7ad8449c85156fcb3841de66c44e113cd62ee7ab5a2f08b2729facd3f3effbfe611a12c0e28cc1a787f1f3e468999e6f68c80975084fd6dbedbde4d0a432ba11304af347521305037c489fdc624c84f1d84c817ac02436b2953f6eb40", 0x96}, {&(0x7f0000000c00)="a97701f974af84477357b3dfeeedd9e283e5ece859a7c280beb573b72c56abcbf19930b3059d4dff7298dbbab99a60899810bdfe48a73a0f9f90abfdd59439c191d81613537cef9fd8c6d0bda7c250fd95b700b0ed7415380b9067236057e48ac805f98b547d4b9b5af51abc02aece22485d8cfe5123fd3ee51a2ece8db6a75289940d751c54c254058f18c258609b05861fab79d9b383cd6a7ca91447ddf60c707fbe5b24ef3ecef05698e6ea4a40", 0xaf}, {&(0x7f0000000580)}], 0x5, &(0x7f0000002d40)=[{0x1010, 0x17, 0x0, "99ccd982ae6c86a1f30c258c05f1b6e7b5f3085a7d4a52a035b1323b4a2c72d9f0a4cf2f78a630ace38870ec91932ee321ede6bbade80fdf60f139022d091ec103b04a3f4922de1dd4131edea34587d1b312f092336a31bb293cd5051472edefd7257a894c0c0271e4fcced36a99e36eaf1ed81103e3b2cafb8ea2c72d230dc00dcbfab44a7e8bddfe3aa51ce13911cba56f023032031808f69783329dd91db7536e26d19bc0e7ffa1345436bac423ee9eace5df1d50d86d153c2fb12ad44fba39ff2596ea597bf96237ad0e7d02c068c7f6abfc1fdef2e48a6324014405e7d2837cad5e03fb2bb1b429fc53f51d51729eb307d270dfeff07dde6005fe865c3ec14ef288e1bc1cc9911fdf4c9470e47fdbeec7bc377f708739c136cf02063b6e6cdad8cfa93aae9fc0a9cd4fb0a52639b7b22f811a7c367bf2f670be1b73a4e43591a59440f6b060355da4bd1f137563a2167dad2dc3d8810e5f3a48d87184c6d173f9013460785a8744b4552552b97789bd1b0609e45c866e52bba9b1b7a327995131dcc03858d4fb4bc567502ae932895de97f7d622a8d216a63f812cc7a8e7b4fe6032aa7b29c4f6aee37118bc6f799d75413b9f567a9805feac8ede71bceba8f45169322ee266c87d40b6be36eb044d110e2943201b60802c8590b5296fa2a59cec10f725ae184632af4beecc738cf1833ae0ff06f40e9bfba6376567536fd67b9005dc45d3b8bd8d37ac100352a6009ac7e8632e01907773a0e1b21268cd16582d53254d333db3f504f925a66d774f2f9844882ed326d2a267663f8831d462732eddc3e6c7549e24c08a405bee44726b9f9abf9f2751ac935d8236fc70e2f7b992c19b465cb8d34ec40398f583ab9dace764c8601ae0bba7ffe82982caa1b59ed94ad3a90400fde3e4c3ce09bc515800ddfc4d017b9c5344df2706fecede2d49c32a25b7ffea13f48073e9a9e2da16be11a6d5c63dcd9256f02aaff7b9d1c1361a01fbc664ca64e325562d155cbec92a149f945ede9b40f4f022e79a47c7c3e865a60200ffff0ad1ea9921c1e3c692d8901c5277b51780895c8cddca31ba6f6e9cf6ef7f010753ef67527994513e3e346d65136317377bb89fe4f11bb6f2a85a096d8022c4251b585b710db8aed827d61a2b324385e97ff409554792ce9532151fc7f7433a25c697e1b94b56b21d14df9a2cdcc2fe953aae84b8f01447f333aaf9ab6c7c28395fa15c94808efa3fcf737d1ac8a3b9e8dc404ee4675fec41492a977b0fb26c257d80930a4a9d1e35d4ada0710e4b682367f9d5ac0e0c5d057ba144dd675314c166af26d06e5d38e046081caf67adc8d5edb872078c36070a19a6d167ae6b6eb208d7a95556476045b381a6b847c42d59e61f7e40d06f8ee1c1e6f62815219e8347a76a02d18ab2dda66be03bd8bae306954a631760cab998b5030b3a977c4cbbb6740a75393d33cf3fa09a2c5d6a170706006e45c4368ffa329f9daf93f5c9efb4cc6f5e1bec2ff413a6834c9d9b934451a0e9109a7d6b546503e71140e05bdc2c1f4ff811cb1fb0187d060edefb51c6117ccf4720aec68898a4d56672a07bbc12724aa4cc52ba589dfb935cd96e1cafbcf0830eb6f94c0097fcd6a2580bd17dede149649ac4c72b70e16f2fa9e2d93ed7d4f6c2927c6170a8f37b7457c59ff65838742607fc50cf710b4bf47c8eb4c154b4216ddcef4020a9e8d9b7f5b456ac14b1bc1b0d0fe1a4a6f11ba9d7c95c2a5a08cfc2d810e915e48ccc7a615bc52b4ddae33c5a9cb0e6f29fe3433980bdf1d826de60f19068e017799605e3c8a4f70b25be5cb153a4d056d6a9e100c549df02a6aeaa6cf31ef50559a295f2c2248bea2b668b5b10e55924472f31fe72811ad4a4ff56f853a3f3ec795c855d9d9aae264c3a1ad27e440e2d05204998f5f7ec55789c1db243857f2ea573e58de002b5b588cf48eb71dcf4cd0619e8d989e7f764b2574bb0834552b29759138f9d9327f8186190c755c163d6b22818e5ede54171e7369107696a094080b95672e408afd6b99e42294499865033205837566ada94dce1743a4fef847a6aa6a860a4c80472a158b1ecc71f1fa426f3925bafad32fc53a6236ae9512acf4e7c1b5c33eec9baed131a5fe646cdc3850ddac5c98f2d152376f148a7922c98477d5a964e4224910f073cce3a80aef83418fda3bcae92bf8d3d3a82c85dce87383e585c6f8742b6ac0bf4f1cd48d286ac01fa5a201c0aab687c36faea02b7401a6f34539d05d8b23ea7d0d1ab215a5fcca5254030a42fe89953aad59c16f901384fb7c5d5b1be506ffdd55ae612c51fb8d1c15f94e708b613ce937f7b7c0f945aa5adee93699cb3d4107327e077690935e3f6bf12e1f4c8e1290c0e22aa3677cdc368f941ba0160b1ef586c17297276469f8851c4ba1a1c95f0bee0ffdd322b359992f8a3027d5cef71add6f4a88d700dc780167d4474f505b00fab28d7a70c7ac95b9e3d2d8b1435c840f83214c21c3e6e25fe3572c6aea1bfa586c166efb14ef9559065bfd76599497eed99771337d43be9d94b1fa6d8b26ce41c0e5b2a97c1ec0eb1fa68c3546b983a4a646cf4cf92d20611a889d15b767ed415dae32d5f432663562f4b69d58ea4c6c3abc10547336da8b5118ede0f80afa9613a9b48c3f5c288fdf537bf45a6e614fe8a6c6ddfbb29408d0fa4b454ff1a5ad879eb181ec25ec4837410d1341caf29b464d49056b38ca4206fae3e31b32b08c6dbd463d265cb319449b1183102fc0b7a5220c74b98175c6ef12e1f8a0cdfa1abe1964827ea3c1d78547a6fa2dbeeec30cde49a38452e632ce09a673fb43b32212c475b24d911471db9a54c9d669677557c9cae592483af49838e9f725ac6cfaa523b5542c594e109f6d549704cf3e8ea2047c722e19730bbfb3054b4471d73cecd2de17dee8cac8e914f9258316459ab3b1dff418b6447be5f3d55270a8f0323ab9f3c433bae2e4a007234ce6e90deca6c98a6b26d1dfc2cd55c508d5c7fed7e65d8694cc48df3e707362fdd06bd7dd3f1e9837cdce376459c87e73c72e178dd5c48e3961e0375b004526b6050f40c28114c61c420ccb8f4af7ebc49a0539a13b72c14bac5e7e0312638507ce983fcb3f8363430778b0b723879a9a184bdc197815b320f8b4fdd3210af8e7f77d22a97beb6b60109bb8ba25f5d3073717f6e57accd78f4ede30d06967d5e3b40276322a885509108dfd05a0fae7e2db672a49a0fb3047c2c9d7ce10394ff4151a322e6d3d4b1abd24de6a5b410e1ef710bd4d8b75262fccc849fe3be789d4435f4e468775a9dff456ea329d316449808311f8272e22a6a1ae70284dbea419aef4b8735386dab6ab1519c53bcd720e68e042790215c59e5abc2be51ecbcb1f9c6db5d86f589103d78ae574f06be1ed249ead97c3f2c715558eb9570ae6fdc52c4bd3bed4a5108767824252e49e5ade1ef3519e70b4eabb4fa9412d83019544aee772745e4cc6358186ead01cff437d12c92f5374f30fa29f30088f0b9e7cf4097a9ac5c03ff2aed28dbccdce6d5048d89d2aaa472d6c5885fde4effc330914d229b23c32c3d143c8182136cb4d4bf016658fe4f071c57b65c4a641a1b17ef7119c1ecf6cad6feac83890c7e1f132efc11034f147d1c0c9be7ffc63b1013b3cdce6d3c92cd519aa81b3fb1707e25b8417f781600bfc27f77108c8c6cdf1fb3bb2e7f968c1f213b5efdba2086036b5c9c51aef5d9609db060ff926b932906577dea66fe47d7e87f4b8cec7eb9824160f9074a9a2aa4e6f6feca253cf88e990640469396049a3e6e0cb9a099e4ae0386e6e1c7d0d78c76944424966e35a08ea41c72bdff767fb1f108d2e6b0f8349096a0cacbf59d2e4e0927d61c55b447efd14e9e9a76e720d2bdd71d79462588a1144222108708a4e79538f0ae8bd13f4235657185facbe0e4aaf64508c2fe7e8f7a31a0bcaeeaef40f7ea2461c339a50541a885630cf6753b4ccf4167ccac83b4c9742eeb597e420cd689fc60bb1d2d9d92a6de4b9afdcb331d0657639215984097253d2cb4d9604646789b183647eddc610878d29ace8610638846e0e68c1b4d3d7a2dd319963f23ad67fc7aab242b02bcbe3f8495c9ae224992bed6381fa41ae5d879bf3fb59a4ae53bd01cc02d221f85a6fdeba3118532d64c5d6d5f001ed3211e81562608e6c4a888e3cc2575deef9e6622690d194527d145a5c0fa2b0cd16522109a4e20c2d9a7accb8138ada4e68a6d7c2842eb163e7b81d63d5b5c6266c21b296816a603a22806c2a2e9f48564f3e8ff6e0dc159bd6e0d5d15dcc5b6dd24149a9b6d060a9c99958a67d10307d2ca58b8d80283a752990048c173932dece67e3b8a9a4c376f654fcfca5876844305611ddb375d7d7cea0f55b94d91e2221b2c7988f00dd490bb7ce4a6636556299db9c060ffe1168472c80aae84eb1cacedc751671191daddd6bfc2aafaf1a3face573c1ac9e46d3dc020e0f8e8ba4749feddb18e9912e5babe21827511482367d8a435a6520d0734f2f06b819d4e52ea61051f03ec62e3f4a9e6c8d9da2e1fc29e5f8e17e2453a22139633145238d12b8bf01528427db6f598c0d801542321544f4f991ed22619422524893a3acaff15ef91a81642f7c21d2d45a70335e9f578b708becf7ca0e471aee1b75c9787f80c4be5b0d0358a37ee0182a3cb5b7d445ae996c28a01ecb80b956c8c4b601593ae838524ae6520d1a08a7f2c9e85bb730f2b8508a261cb1ee54672b915efe117a885378194e3ec4512b5daadd18a7cd427979cb26444d0f27f870075a794e1e4d06b4e767f4bef220e6e9739cde829f06e45732a5e6d96dd17ad18179f478eb66d6efd3285991be143b7bc919c060647d9e0dd294c8c544602b11595249ab998ba9d05c0ea8fb2435dad9e08a1d97b1ab3e2d9e7a9d26273477ce0c7af65e57b5d4cbc32a7be1168d78a1000ee387d3b9de9cb74aae1f09ff09857a70021084e072cb90ed8c47c70fe7df54149676cea84ccdd7d5b27d82a98598ab3061354cd2687386ee4c863758cfa92addcd2666796727e4ebdf97ab21923b743ade6585eb98d0a2110bad4c65fa860fdb4e914fc2e0bffad77898b6f5d2260bc77eae812352a54fd1f58756d46fc0925931a75461b9184958f663d99a31002f07aa7415a083c22281f7a5f6d8c15017856aa9cc4af3924167902f341cb1ea768ad510606e6dc70fdc4aa94f642576ce27005dbc1bbde8cd879e30698db430d75df2df83862f65a56195a50f5017f95bbf889f0d336745d66b0db9646b615a84c8d9cf628088b4441094bad4049f74f9bc29109e039a478d70c9c2b4f39086b08e9987fc73a6bab4a0dbdd7ab5e121adcc858446016bb526f50d5dba163eee986de87ba474b89dbe169be0bccd48f12648d2433275b861550512a028599133da6f015b391f3869796813ba0604ae9fbb8a7d107bc9e0916190336c416fb84219b388fe83adbbfb415f06f5b988c92d973e251e060c94dd91479c03ce70c28a365cd1b127181f14254cb09ae1b9b35c3de4bf7eb9c439f0ebc2a0c225b02f8a15cd86c4e4b48346dc28ba9d493cc3a3b35ee58d415227bd5235f8fc97a3cb50082d2512d8456f35021bc5638194eb5e0ef004c021fcfffa8ceaaea4cd07c01e54d50ea6ec14e74eadcb29ffda4a54d4f7624b78d546d7ba592ae9028b4ed621eded34157674f26e70e60188d6f06f599f71effe059a80794e7c66203da6c63a73f7771e10efd2c7c4cef1319295f0"}, {0x68, 0x84, 0x6, "185b3cc314349c556c1ca72af906417b8cd0e6282da1fa9241bdf6d51417bbf0b427871cb90f8a2810be9a01f1ed95707eeed8fa7b284e0c56b02956a6cf7b93d0f4dc899f3e21745df87371f06e801bcbdecdd35c9e19"}, {0x70, 0x119, 0x8000, "bb74f428971b4a44695194dc01f66fed281f363f65635ed587c4737d1d55c070921c63ce6b320d67b193f8768f48bd4ed006635eaa39d47a74915db88df87e9efeb3951a66b8641960a5bf217c8490a57d8f58d8a3bf7fdaf1e0a6"}, {0x58, 0x11b, 0x10001, "0de697a4d33966b1c5a549ee4bf030345dc0f50f176a158b2046b692507284340026dae4227570549f22fafc9685517735a933d187559df4ef74e85185671aaf97e6"}, {0x40, 0x29, 0x1, "934dceeb55929b1cbd27ab20db45f248bbd16f90900402d29b3137f49542e0025ca3bb668b4b9311ba17e7793f"}, {0x1010, 0x108, 0x0, "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"}, {0x30, 0x102, 0x2, "809c58901010b865a99b6f5bb44b760433615090860682456faba8c30e35b923"}], 0x21c0, 0x880}, 0x80) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000700)='./file0/file0\x00', &(0x7f00000005c0)='rpc_pipefs\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair(0x11, 0x2, 0x4, &(0x7f0000000dc0)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0x50, &(0x7f0000000d40)}, 0x10) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:44 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000280)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000240)={r4}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 635.038190] FAULT_INJECTION: forcing a failure. [ 635.038190] name failslab, interval 1, probability 0, space 0, times 0 [ 635.049589] CPU: 0 PID: 824 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 635.056702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.066062] Call Trace: [ 635.068669] dump_stack+0x194/0x24d [ 635.072320] ? arch_local_irq_restore+0x53/0x53 [ 635.076998] ? __save_stack_trace+0x7e/0xd0 [ 635.081338] should_fail+0x8c0/0xa40 [ 635.085061] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 635.090164] ? kasan_kmalloc+0xad/0xe0 [ 635.094036] ? kmem_cache_alloc_trace+0x136/0x740 [ 635.098874] ? __memcg_init_list_lru_node+0x169/0x270 [ 635.104049] ? __list_lru_init+0x544/0x750 [ 635.108263] ? sget_userns+0x6b1/0xe40 [ 635.112137] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 635.116889] ? do_mount+0xea4/0x2bb0 [ 635.120590] ? SyS_mount+0xab/0x120 [ 635.124194] ? do_syscall_64+0x281/0x940 [ 635.128259] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.133633] ? find_held_lock+0x35/0x1d0 [ 635.137687] ? __lock_is_held+0xb6/0x140 [ 635.141750] ? check_same_owner+0x320/0x320 [ 635.146076] ? rcu_note_context_switch+0x710/0x710 [ 635.151014] should_failslab+0xec/0x120 [ 635.154985] kmem_cache_alloc_trace+0x4b/0x740 [ 635.159556] ? __kmalloc_node+0x33/0x70 [ 635.163537] __memcg_init_list_lru_node+0x169/0x270 [ 635.168539] ? list_lru_add+0x7c0/0x7c0 [ 635.172500] ? __kmalloc_node+0x47/0x70 [ 635.176467] __list_lru_init+0x544/0x750 [ 635.180513] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 635.186384] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 635.191395] ? lockdep_init_map+0x9/0x10 [ 635.195440] sget_userns+0x6b1/0xe40 [ 635.199133] ? set_anon_super+0x20/0x20 [ 635.203094] ? put_filp+0x90/0x90 [ 635.206531] ? destroy_unused_super.part.6+0xd0/0xd0 [ 635.211627] ? alloc_vfsmnt+0x762/0x9c0 [ 635.215579] ? path_lookupat+0x238/0xba0 [ 635.219626] ? mnt_free_id.isra.21+0x50/0x50 [ 635.224038] ? trace_hardirqs_off+0x10/0x10 [ 635.228340] ? putname+0xee/0x130 [ 635.231779] ? cap_capable+0x1b5/0x230 [ 635.235661] ? security_capable+0x8e/0xc0 [ 635.239814] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 635.244989] ? ns_capable_common+0xcf/0x160 [ 635.249310] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 635.254481] mount_ns+0x6d/0x190 [ 635.257830] rpc_mount+0x9e/0xd0 [ 635.261176] mount_fs+0x66/0x2d0 [ 635.264531] vfs_kern_mount.part.26+0xc6/0x4a0 [ 635.269091] ? may_umount+0xa0/0xa0 [ 635.272713] ? _raw_read_unlock+0x22/0x30 [ 635.276845] ? __get_fs_type+0x8a/0xc0 [ 635.280734] do_mount+0xea4/0x2bb0 [ 635.284253] ? __might_fault+0x110/0x1d0 [ 635.288312] ? copy_mount_string+0x40/0x40 [ 635.292543] ? check_same_owner+0x320/0x320 [ 635.296853] ? __check_object_size+0x8b/0x530 [ 635.301332] ? __might_sleep+0x95/0x190 [ 635.305289] ? kasan_check_write+0x14/0x20 [ 635.309513] ? _copy_from_user+0x99/0x110 [ 635.313655] ? memdup_user+0x5e/0x90 [ 635.317346] ? copy_mount_options+0x1f7/0x2e0 [ 635.321820] SyS_mount+0xab/0x120 [ 635.325248] ? copy_mnt_ns+0xb30/0xb30 [ 635.329116] do_syscall_64+0x281/0x940 [ 635.332994] ? __do_page_fault+0xc90/0xc90 [ 635.337208] ? _raw_spin_unlock_irq+0x27/0x70 [ 635.341682] ? finish_task_switch+0x1c1/0x7e0 [ 635.346160] ? syscall_return_slowpath+0x550/0x550 [ 635.351070] ? syscall_return_slowpath+0x2ac/0x550 [ 635.355978] ? prepare_exit_to_usermode+0x350/0x350 [ 635.360991] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 635.366340] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.371165] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.376329] RIP: 0033:0x4548b9 [ 635.379495] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 12:28:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:44 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0xffffffff, 0x3, 0x1, 0x12, 0xffffffffffffffff, 0x6}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000580)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000b80)={r0, &(0x7f0000000700)="a696319b03df8f250a6583859c592787e7be2c867c0b13e7590d09eb199464083b23818ece75c32e4abf724198ffbee7a742ca6185be2d2b577792bd9c0a05f9ed8775bb15962236b1e239c8dba0f53894fc5d111232371e787cec26e90e0c49c0b1120d6b1a1b7c59696103870fb6adb934b9ddea00f5f39075f4144906b17c7221951b2633b335da21b62e9ce76d366753146ed323dca1da8a3e4ee7024eda81e65077a7fbfbdacfd6caeff000b21175b2321f310cc2be2df7e487b1b6dd", &(0x7f0000000ac0)=""/184}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000005c0)={r1}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 1 (fault-call:11 fault-nth:26): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:44 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 635.387192] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 635.394445] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 635.401706] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 635.408973] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 635.416230] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/29 12:28:44 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:44 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 635.523858] FAULT_INJECTION: forcing a failure. [ 635.523858] name failslab, interval 1, probability 0, space 0, times 0 [ 635.535413] CPU: 0 PID: 848 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 635.542522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.551874] Call Trace: [ 635.554485] dump_stack+0x194/0x24d [ 635.558115] ? arch_local_irq_restore+0x53/0x53 [ 635.562784] ? __save_stack_trace+0x7e/0xd0 [ 635.567132] should_fail+0x8c0/0xa40 [ 635.570858] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 635.575953] ? kasan_kmalloc+0xad/0xe0 [ 635.579816] ? kmem_cache_alloc_trace+0x136/0x740 [ 635.584637] ? __memcg_init_list_lru_node+0x169/0x270 [ 635.589812] ? __list_lru_init+0x544/0x750 [ 635.594029] ? sget_userns+0x6b1/0xe40 [ 635.597897] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 635.602628] ? do_mount+0xea4/0x2bb0 [ 635.606323] ? SyS_mount+0xab/0x120 [ 635.609934] ? do_syscall_64+0x281/0x940 [ 635.613978] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.619328] ? find_held_lock+0x35/0x1d0 [ 635.623377] ? __lock_is_held+0xb6/0x140 [ 635.627431] ? check_same_owner+0x320/0x320 [ 635.631734] ? rcu_note_context_switch+0x710/0x710 [ 635.636658] should_failslab+0xec/0x120 [ 635.640613] kmem_cache_alloc_trace+0x4b/0x740 [ 635.645177] ? __kmalloc_node+0x33/0x70 [ 635.649141] ? __kmalloc_node+0x33/0x70 [ 635.653098] ? rcu_read_lock_sched_held+0x108/0x120 [ 635.658107] __memcg_init_list_lru_node+0x169/0x270 [ 635.663114] ? list_lru_add+0x7c0/0x7c0 [ 635.667075] ? __kmalloc_node+0x47/0x70 [ 635.671054] __list_lru_init+0x544/0x750 [ 635.675127] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 635.680998] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 635.686018] ? lockdep_init_map+0x9/0x10 [ 635.690068] sget_userns+0x6b1/0xe40 [ 635.694202] ? set_anon_super+0x20/0x20 [ 635.698158] ? put_filp+0x90/0x90 [ 635.701588] ? destroy_unused_super.part.6+0xd0/0xd0 [ 635.706668] ? alloc_vfsmnt+0x762/0x9c0 [ 635.710623] ? path_lookupat+0x238/0xba0 [ 635.714662] ? mnt_free_id.isra.21+0x50/0x50 [ 635.719064] ? trace_hardirqs_off+0x10/0x10 [ 635.723375] ? putname+0xee/0x130 [ 635.726809] ? cap_capable+0x1b5/0x230 [ 635.730680] ? security_capable+0x8e/0xc0 [ 635.734810] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 635.739975] ? ns_capable_common+0xcf/0x160 [ 635.744274] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 635.749441] mount_ns+0x6d/0x190 [ 635.752799] rpc_mount+0x9e/0xd0 [ 635.756145] mount_fs+0x66/0x2d0 [ 635.759492] vfs_kern_mount.part.26+0xc6/0x4a0 [ 635.764057] ? may_umount+0xa0/0xa0 [ 635.767662] ? _raw_read_unlock+0x22/0x30 [ 635.771786] ? __get_fs_type+0x8a/0xc0 [ 635.775657] do_mount+0xea4/0x2bb0 [ 635.779177] ? __might_fault+0x110/0x1d0 [ 635.783220] ? copy_mount_string+0x40/0x40 [ 635.787428] ? check_same_owner+0x320/0x320 [ 635.791898] ? __check_object_size+0x8b/0x530 [ 635.796380] ? __might_sleep+0x95/0x190 [ 635.800336] ? kasan_check_write+0x14/0x20 [ 635.804551] ? _copy_from_user+0x99/0x110 [ 635.808687] ? memdup_user+0x5e/0x90 [ 635.812393] ? copy_mount_options+0x1f7/0x2e0 [ 635.816872] SyS_mount+0xab/0x120 [ 635.820301] ? copy_mnt_ns+0xb30/0xb30 [ 635.824172] do_syscall_64+0x281/0x940 [ 635.828040] ? __do_page_fault+0xc90/0xc90 [ 635.832251] ? _raw_spin_unlock_irq+0x27/0x70 [ 635.836726] ? finish_task_switch+0x1c1/0x7e0 [ 635.841201] ? syscall_return_slowpath+0x550/0x550 [ 635.846121] ? syscall_return_slowpath+0x2ac/0x550 [ 635.851040] ? prepare_exit_to_usermode+0x350/0x350 [ 635.856055] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 635.861404] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 635.866234] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 635.871406] RIP: 0033:0x4548b9 2018/03/29 12:28:45 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000040000000000fcebb8b1c0835aab0c95a59225fc0415f02b39897c1e0a3b810938f487e461c13320bd080065c6f276116c63f64b78f16eae44f981d3ed464b780776a6171c94159684990e8700a23768add4fbac32c73a507bf92f29cf255c7b1687121753800e437acfa012e4115653451bd0d48f4215a020adf990081ea7365f7120d270082b173ab5638d84c94a37f912319a7e721d0bafabae2ee43d6187ed05000000000000009afd0da474019f856f73a7663b8be1109a3e8429d2acf96d287fae77464f0d"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) recvmsg(r1, &(0x7f0000009bc0)={&(0x7f0000008a40)=@can={0x0, 0x0}, 0x80, &(0x7f0000009b40)=[{&(0x7f0000008ac0)=""/4096, 0x1000}, {&(0x7f0000009ac0)=""/120, 0x78}], 0x2, &(0x7f0000009b80), 0x0, 0x2}, 0x62) bpf$PROG_LOAD(0x5, &(0x7f0000009c00)={0xc, 0xd, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x7fffffff, 0xf, 0x4, 0xf, 0x4}, @ldst={0x2, 0x2, 0x0, 0xf, 0xe, 0x40, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0x2e}, @generic={0x8, 0xffffffffffff8000, 0x2, 0x6}], {0x95}}, &(0x7f0000000700)='syzkaller\x00', 0x0, 0xf4, &(0x7f0000000980)=""/244, 0x41f00, 0x1, [], r4}, 0x48) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") r6 = gettid() perf_event_open(&(0x7f0000000d00)={0x6, 0x70, 0xffffffffffffe0d3, 0x1ff, 0x9, 0x1ff, 0x0, 0x4, 0x400, 0x8, 0x1, 0x7, 0x8, 0x9, 0x3, 0x5, 0x23080000000, 0x80000000, 0x3, 0x6, 0x0, 0x8, 0x3f, 0x13, 0x4, 0x9, 0xfffffffffffffffe, 0x10000, 0x2, 0x1, 0x4, 0x2c6, 0x1, 0x9, 0x0, 0x9, 0xffffffffffffff1e, 0x8, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000740), 0x8}, 0x0, 0x100000001, 0x10001, 0x7, 0xa14, 0x80000000, 0x9}, r6, 0x7, r5, 0x8) [ 635.874574] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 635.882261] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 635.889504] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 635.896748] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 635.903993] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 635.911241] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a 2018/03/29 12:28:45 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:45 executing program 1 (fault-call:11 fault-nth:27): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:45 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 636.019428] FAULT_INJECTION: forcing a failure. [ 636.019428] name failslab, interval 1, probability 0, space 0, times 0 [ 636.030757] CPU: 0 PID: 863 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 636.037856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.047214] Call Trace: [ 636.049816] dump_stack+0x194/0x24d [ 636.053465] ? arch_local_irq_restore+0x53/0x53 [ 636.058137] ? __save_stack_trace+0x7e/0xd0 [ 636.062472] should_fail+0x8c0/0xa40 [ 636.066187] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 636.071287] ? kasan_kmalloc+0xad/0xe0 [ 636.075163] ? kmem_cache_alloc_trace+0x136/0x740 [ 636.080000] ? __memcg_init_list_lru_node+0x169/0x270 [ 636.085194] ? __list_lru_init+0x544/0x750 [ 636.089418] ? sget_userns+0x6b1/0xe40 [ 636.093301] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 636.098044] ? do_mount+0xea4/0x2bb0 [ 636.101742] ? SyS_mount+0xab/0x120 [ 636.105360] ? do_syscall_64+0x281/0x940 [ 636.109412] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.114785] ? find_held_lock+0x35/0x1d0 [ 636.118847] ? __lock_is_held+0xb6/0x140 [ 636.122925] ? check_same_owner+0x320/0x320 [ 636.127290] ? rcu_note_context_switch+0x710/0x710 [ 636.132248] should_failslab+0xec/0x120 [ 636.136220] kmem_cache_alloc_trace+0x4b/0x740 [ 636.140793] ? __kmalloc_node+0x33/0x70 [ 636.144755] ? __kmalloc_node+0x33/0x70 [ 636.148727] ? rcu_read_lock_sched_held+0x108/0x120 [ 636.153748] __memcg_init_list_lru_node+0x169/0x270 [ 636.158769] ? list_lru_add+0x7c0/0x7c0 [ 636.162738] ? __kmalloc_node+0x47/0x70 [ 636.166719] __list_lru_init+0x544/0x750 [ 636.170787] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 636.176673] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 636.181698] ? lockdep_init_map+0x9/0x10 [ 636.185757] sget_userns+0x6b1/0xe40 [ 636.189461] ? set_anon_super+0x20/0x20 [ 636.193439] ? put_filp+0x90/0x90 [ 636.196887] ? destroy_unused_super.part.6+0xd0/0xd0 [ 636.201983] ? alloc_vfsmnt+0x762/0x9c0 [ 636.205946] ? path_lookupat+0x238/0xba0 [ 636.209998] ? mnt_free_id.isra.21+0x50/0x50 [ 636.214415] ? trace_hardirqs_off+0x10/0x10 [ 636.218750] ? putname+0xee/0x130 [ 636.222202] ? cap_capable+0x1b5/0x230 [ 636.226094] ? security_capable+0x8e/0xc0 [ 636.230244] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 636.235450] ? ns_capable_common+0xcf/0x160 [ 636.239774] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 636.244962] mount_ns+0x6d/0x190 [ 636.248332] rpc_mount+0x9e/0xd0 [ 636.251698] mount_fs+0x66/0x2d0 [ 636.255067] vfs_kern_mount.part.26+0xc6/0x4a0 [ 636.259650] ? may_umount+0xa0/0xa0 [ 636.263272] ? _raw_read_unlock+0x22/0x30 [ 636.267412] ? __get_fs_type+0x8a/0xc0 [ 636.271307] do_mount+0xea4/0x2bb0 [ 636.274836] ? __might_fault+0x110/0x1d0 [ 636.278905] ? copy_mount_string+0x40/0x40 [ 636.283133] ? check_same_owner+0x320/0x320 [ 636.287448] ? __check_object_size+0x8b/0x530 [ 636.291953] ? __might_sleep+0x95/0x190 [ 636.295937] ? kasan_check_write+0x14/0x20 [ 636.300171] ? _copy_from_user+0x99/0x110 [ 636.304323] ? memdup_user+0x5e/0x90 [ 636.308034] ? copy_mount_options+0x1f7/0x2e0 [ 636.312531] SyS_mount+0xab/0x120 [ 636.315985] ? copy_mnt_ns+0xb30/0xb30 [ 636.319871] do_syscall_64+0x281/0x940 [ 636.323748] ? __do_page_fault+0xc90/0xc90 [ 636.327975] ? _raw_spin_unlock_irq+0x27/0x70 [ 636.332465] ? finish_task_switch+0x1c1/0x7e0 [ 636.336957] ? syscall_return_slowpath+0x550/0x550 [ 636.341883] ? syscall_return_slowpath+0x2ac/0x550 [ 636.346803] ? prepare_exit_to_usermode+0x350/0x350 [ 636.351834] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 636.357205] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 636.362053] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 636.367239] RIP: 0033:0x4548b9 [ 636.370431] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 636.378135] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 636.385411] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 636.392759] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 636.400020] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 636.407282] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 636.831974] IPVS: ftp: loaded support on port[0] = 21 [ 636.859051] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 12:28:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x0, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:46 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 1 (fault-call:11 fault-nth:28): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7f, 0x3, 0x1, 0x11, 0xffffffffffffffff, 0xfffffffffffffffd}, 0x2c) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0xb175, 0x2, 0x3, 0x3, 0x0, 0x7, 0x80000, 0x1, 0x77f, 0xe0, 0x5, 0x6, 0x5, 0x1000, 0x8001, 0x5, 0x100000001, 0x7, 0x80, 0x10000, 0x9, 0x6, 0x800, 0x0, 0x6, 0x1, 0x9, 0x101, 0x200, 0x10000, 0x9, 0x1, 0x5, 0x1, 0x7fffffff, 0x10001, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x6}, 0x0, 0x1, 0x40, 0x0, 0x5, 0xfffffffffffffe01, 0xfff}, 0x0, 0xd, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 636.953940] FAULT_INJECTION: forcing a failure. [ 636.953940] name failslab, interval 1, probability 0, space 0, times 0 [ 636.965285] CPU: 0 PID: 892 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 636.972386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.981746] Call Trace: [ 636.984338] dump_stack+0x194/0x24d [ 636.987953] ? arch_local_irq_restore+0x53/0x53 [ 636.992609] ? __save_stack_trace+0x7e/0xd0 [ 636.996927] should_fail+0x8c0/0xa40 [ 637.000626] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 637.005709] ? kasan_kmalloc+0xad/0xe0 [ 637.009574] ? kmem_cache_alloc_trace+0x136/0x740 [ 637.014392] ? __memcg_init_list_lru_node+0x169/0x270 [ 637.019558] ? __list_lru_init+0x544/0x750 [ 637.023768] ? sget_userns+0x6b1/0xe40 [ 637.027636] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 637.032366] ? do_mount+0xea4/0x2bb0 [ 637.036053] ? SyS_mount+0xab/0x120 [ 637.039655] ? do_syscall_64+0x281/0x940 [ 637.043693] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.049043] ? find_held_lock+0x35/0x1d0 [ 637.053090] ? __lock_is_held+0xb6/0x140 [ 637.057147] ? check_same_owner+0x320/0x320 [ 637.061452] ? rcu_note_context_switch+0x710/0x710 [ 637.066372] should_failslab+0xec/0x120 [ 637.070342] kmem_cache_alloc_trace+0x4b/0x740 [ 637.074903] ? __kmalloc_node+0x33/0x70 [ 637.078853] ? __kmalloc_node+0x33/0x70 [ 637.082806] ? rcu_read_lock_sched_held+0x108/0x120 [ 637.087825] __memcg_init_list_lru_node+0x169/0x270 [ 637.092830] ? list_lru_add+0x7c0/0x7c0 [ 637.096784] ? __kmalloc_node+0x47/0x70 [ 637.100747] __list_lru_init+0x544/0x750 [ 637.104884] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 637.110749] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 637.115753] ? lockdep_init_map+0x9/0x10 [ 637.119796] sget_userns+0x6b1/0xe40 [ 637.123486] ? set_anon_super+0x20/0x20 [ 637.127443] ? put_filp+0x90/0x90 [ 637.130874] ? destroy_unused_super.part.6+0xd0/0xd0 [ 637.135952] ? alloc_vfsmnt+0x762/0x9c0 [ 637.139902] ? path_lookupat+0x238/0xba0 [ 637.143940] ? mnt_free_id.isra.21+0x50/0x50 [ 637.148330] ? trace_hardirqs_off+0x10/0x10 [ 637.152633] ? putname+0xee/0x130 [ 637.156073] ? cap_capable+0x1b5/0x230 [ 637.159944] ? security_capable+0x8e/0xc0 [ 637.164074] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 637.169240] ? ns_capable_common+0xcf/0x160 [ 637.173550] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 637.178718] mount_ns+0x6d/0x190 [ 637.182069] rpc_mount+0x9e/0xd0 [ 637.185416] mount_fs+0x66/0x2d0 [ 637.188768] vfs_kern_mount.part.26+0xc6/0x4a0 [ 637.193333] ? may_umount+0xa0/0xa0 [ 637.196940] ? _raw_read_unlock+0x22/0x30 [ 637.201067] ? __get_fs_type+0x8a/0xc0 [ 637.204939] do_mount+0xea4/0x2bb0 [ 637.208459] ? __might_fault+0x110/0x1d0 [ 637.212513] ? copy_mount_string+0x40/0x40 [ 637.216727] ? check_same_owner+0x320/0x320 [ 637.221030] ? __check_object_size+0x8b/0x530 [ 637.225513] ? __might_sleep+0x95/0x190 [ 637.229471] ? kasan_check_write+0x14/0x20 [ 637.233684] ? _copy_from_user+0x99/0x110 [ 637.237812] ? memdup_user+0x5e/0x90 [ 637.241508] ? copy_mount_options+0x1f7/0x2e0 [ 637.245988] SyS_mount+0xab/0x120 [ 637.249426] ? copy_mnt_ns+0xb30/0xb30 [ 637.253299] do_syscall_64+0x281/0x940 [ 637.257163] ? __do_page_fault+0xc90/0xc90 [ 637.261378] ? _raw_spin_unlock_irq+0x27/0x70 [ 637.265853] ? finish_task_switch+0x1c1/0x7e0 [ 637.270330] ? syscall_return_slowpath+0x550/0x550 [ 637.275242] ? syscall_return_slowpath+0x2ac/0x550 [ 637.280153] ? prepare_exit_to_usermode+0x350/0x350 [ 637.285151] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 637.290504] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.295336] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.300510] RIP: 0033:0x4548b9 2018/03/29 12:28:46 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 637.303677] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 637.311364] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 637.318613] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 637.325859] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 637.333104] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 637.340354] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c 2018/03/29 12:28:46 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:46 executing program 1 (fault-call:11 fault-nth:29): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:46 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 637.470277] FAULT_INJECTION: forcing a failure. [ 637.470277] name failslab, interval 1, probability 0, space 0, times 0 [ 637.481615] CPU: 0 PID: 910 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 637.488713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.498066] Call Trace: [ 637.500648] dump_stack+0x194/0x24d [ 637.504263] ? arch_local_irq_restore+0x53/0x53 [ 637.508914] ? __save_stack_trace+0x7e/0xd0 [ 637.513228] should_fail+0x8c0/0xa40 [ 637.516926] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 637.522010] ? kasan_kmalloc+0xad/0xe0 [ 637.525878] ? kmem_cache_alloc_trace+0x136/0x740 [ 637.530699] ? __memcg_init_list_lru_node+0x169/0x270 [ 637.535881] ? __list_lru_init+0x544/0x750 [ 637.540095] ? sget_userns+0x6b1/0xe40 [ 637.543963] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 637.548695] ? do_mount+0xea4/0x2bb0 [ 637.552566] ? SyS_mount+0xab/0x120 [ 637.556173] ? do_syscall_64+0x281/0x940 [ 637.560218] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.565583] ? find_held_lock+0x35/0x1d0 [ 637.569630] ? __lock_is_held+0xb6/0x140 [ 637.573709] ? check_same_owner+0x320/0x320 [ 637.578018] ? rcu_note_context_switch+0x710/0x710 [ 637.582940] should_failslab+0xec/0x120 [ 637.586895] kmem_cache_alloc_trace+0x4b/0x740 [ 637.591458] ? __kmalloc_node+0x33/0x70 [ 637.595672] ? __kmalloc_node+0x33/0x70 [ 637.599626] ? rcu_read_lock_sched_held+0x108/0x120 [ 637.604629] __memcg_init_list_lru_node+0x169/0x270 [ 637.609632] ? list_lru_add+0x7c0/0x7c0 [ 637.613585] ? __kmalloc_node+0x47/0x70 [ 637.617544] __list_lru_init+0x544/0x750 [ 637.621591] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 637.627458] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 637.632464] ? lockdep_init_map+0x9/0x10 [ 637.636511] sget_userns+0x6b1/0xe40 [ 637.640202] ? set_anon_super+0x20/0x20 [ 637.644162] ? put_filp+0x90/0x90 [ 637.647594] ? destroy_unused_super.part.6+0xd0/0xd0 [ 637.652673] ? alloc_vfsmnt+0x762/0x9c0 [ 637.656623] ? path_lookupat+0x238/0xba0 [ 637.660662] ? mnt_free_id.isra.21+0x50/0x50 [ 637.665054] ? trace_hardirqs_off+0x10/0x10 [ 637.669354] ? putname+0xee/0x130 [ 637.672791] ? cap_capable+0x1b5/0x230 [ 637.676664] ? security_capable+0x8e/0xc0 [ 637.680794] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 637.685961] ? ns_capable_common+0xcf/0x160 [ 637.690265] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 637.695433] mount_ns+0x6d/0x190 [ 637.698803] rpc_mount+0x9e/0xd0 [ 637.702152] mount_fs+0x66/0x2d0 [ 637.705504] vfs_kern_mount.part.26+0xc6/0x4a0 [ 637.710071] ? may_umount+0xa0/0xa0 [ 637.713679] ? _raw_read_unlock+0x22/0x30 [ 637.717810] ? __get_fs_type+0x8a/0xc0 [ 637.721685] do_mount+0xea4/0x2bb0 [ 637.725203] ? __might_fault+0x110/0x1d0 [ 637.729252] ? copy_mount_string+0x40/0x40 [ 637.733467] ? check_same_owner+0x320/0x320 [ 637.737768] ? __check_object_size+0x8b/0x530 [ 637.742252] ? __might_sleep+0x95/0x190 [ 637.746215] ? kasan_check_write+0x14/0x20 [ 637.750435] ? _copy_from_user+0x99/0x110 [ 637.754573] ? memdup_user+0x5e/0x90 [ 637.758264] ? copy_mount_options+0x1f7/0x2e0 [ 637.762743] SyS_mount+0xab/0x120 [ 637.766176] ? copy_mnt_ns+0xb30/0xb30 [ 637.770047] do_syscall_64+0x281/0x940 [ 637.773915] ? __do_page_fault+0xc90/0xc90 [ 637.778125] ? _raw_spin_unlock_irq+0x27/0x70 [ 637.782600] ? finish_task_switch+0x1c1/0x7e0 [ 637.787074] ? syscall_return_slowpath+0x550/0x550 [ 637.791991] ? syscall_return_slowpath+0x2ac/0x550 [ 637.796906] ? prepare_exit_to_usermode+0x350/0x350 [ 637.801905] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 637.807268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 637.812107] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 637.817274] RIP: 0033:0x4548b9 [ 637.820440] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 637.828128] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 637.835378] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 637.842623] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 637.849883] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 637.857129] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 638.480940] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 12:28:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='syzkaller\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:47 executing program 1 (fault-call:11 fault-nth:30): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:47 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x2, 0x10}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x5, 0x7e, 0x3, 0x1, 0x11, r0}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000c00)='cramfs\x00', 0x0, &(0x7f0000000280)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000002000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000280)='trusted(\x00') bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0xa}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f00000009c0)='GPL\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:47 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) mount(&(0x7f00000025c0)='./file1\x00', &(0x7f0000002c80)='./file0/file0\x00', &(0x7f0000002d00)='openpromfs\x00', 0x2000000, &(0x7f0000002d40)="89cdc10cc87fc721937b00f0244c4374b6b7704bd8af734b11f875a1981e86256d4a60505e115fc9a7741d74c2edd932d0f440ec1e8e5f845e4f8ca4bfa65445c2689e68745fed01ab922c2b7c41c3d17fb967a34756ffade18a43801f3901d17b55ea4abb6c72b3572a3f473b6d4fcab2a7e36da0c74242418e4f965544cf615e98cb35c63f7c717f3b84e24b8f11aad02a69f69f2790c64752c3b61299e6f954715f0c7982f11bf2dc504c362427e9a241c072be514a5bbb1d0dcdf87b0d506d319cdfbdca2d9a4680f8ade69a1d12181007fb636fc59a44ba90cdfc39232d07d3eb6e00a90d06b8d99b23416177843e69b72f63b5b43962bac31a7ce221baa623d39a33b1179a12972bb9d856abda6475ddaabb13b00d327cd88ddb725dfca2427436da8f93e0dd93440a9063a5e340c97886102909190828ded0f5fa5c21ba3473cfc8bb51815510a43a8e319e6ef2f8107e70fdc9eec8169a8146d3f05f871c3b4b67cad9cb29e0e06c020a0923944cc5b4162a0222766a5539283476aa95db55f55f5f6236427d04b118872385d6a3fd01f53e7d9e1cf0ce8f57138df13fe7807a540c29416709b8c851e401f05637f069f19368acfe0d9e1d61c7a8c2aff69b80e544fa91efe57145fb5cd5c598a633477c7ec9c2a236206172d079c66b431071242081a8b50e1894121c9777dd052848f131ca6c02e68c0e1890fd165489f9a4cb3ae7a3918dfdbd85b7e3dd0e3ca9fabbbd839092f52b92cbcc603f9bb8d410d9a75012221a530ecbed8dc024c8c7b41c777d22832f16b4d083a24e20f531f12922420814bbd08132e76e046cee6e80a364f0ea383ab186b8346a283cb404d8fd381f5c6ac807bfcd8948a717f86713fbdb16ebc39e82798b882f766df49d23c575f3a99794de18260166479fd5c77483bee3c085cf21c4576ccce6ee740b7161e3402930491b4bd11ae40daba68bc7d053b90bccaa8ad80252b67d464082acd66346bfd63e55d98ab1915a6992643b4828873b203f7bc68acbbe345e64dbf986f9f048fd26186bf0847b4af1d439b098b4e6c9fb79c42b2df816ece83d11a1cbe34cbc495233c3323f799f5714fcb7f61596a3c19e5af6389208510faa1b67c4e957ca118ba3122de8df794fa3b438809f4195cdb3e74f47ef1b95931037c85e297d36fc1e5358154708e0b7d72595a7dd5ba4c2d8d54c6354a114284088a231bbfe038163f489dd630fcf9e1a5ebfebae4551d84256e2322b85eae98c2e41a38ebbf47f08a913dc306b7040e57bad4cce8efcd27564d4128323217c12a58f30d53f39d0290ab0f6f6dbbfdefef37c6f2ad10940cbca611ec2796c29e7f2f292aa1fe2ecad178ce30b754aca0bf598d6d886bd2a2c787d0e015c2735bf87c39baa5ecab924f0934ead5094d75c66d13804970d39ccb66f7f7e76ba31714f8ebdc2f64ed3b44215102fe96c23d9a70335348f4bc9e76f958bda012996f295e1fcf1a7868832e356520e58a1f742f198e58dabf90032ec15e3a7af4bbc6014d8580248f7a3e647fa6cde66f89abc5828f92896801c892c6be8135d5c6ab17bf0d08e81ec31c0955b044731b051d23a435fb54b91f9adf6bf563da3ab87722b38663cc0686c2b5121d0c0ebaab2b0414ab921b13e2496bc79977e7f8b6672d7a5cf8fd7a3b7a2f697bc81879010ea9348f420bf787482b0c3e4601e1874e2d6f0b48e873bd2478b98ea6669916490faedcea896e2816e26a2141382e33f672fbb0dca811d5208459f7f7548fbfdfc340b817f6be399dae948001b933e09e3cdc7b4782dc85654178889648b2161bc3920e277cdc3f85e8c4468c6ac2fada6857d677bf466891ec0fa471d346bbbfa2edd09832dc7c503f96d211043b705d33b7892d6d6a920199ddd9a5ef1a120f611ad8d3fcc4370671174f282cb4e35ac5e240c45e4dfd2504d5eab62b2b571676872066732428b8cb6ceee0c99415b6d39ff2db77f5d1c9cbf23a836b7f34e3bababd8a8d18e1b547b9811eb557fbaea789f743657ad5d77eed2c19f5f37628b087e822b34997b8def5aeb5e96afd0988cc403f22441dc680c8d27f330bd33d2a2c29ffae05f7e2829bec47050521e93d29e7c8a9c16eb2a8203d38083c2c9bb147c8a9bc65392b7dd5822a297c50ea28c64e0c1b93b0da48bdf3fdbda723cfc5f3cf286826d9421b5364a03d0b50853afcbca015ab97010ea6f4fde11763ba23e5c55ed391e93019ccefba344692b43bec988684de6ecb697471b72a51b136ba5747c29e30f76d7891d5b101923126f84ce70838e9ff7b37d21a4dcefef28dcaf93589c90aec642e5d838ac8b49a807496563aeedbb756fe208dd47ad91834c061f8cd9b1808f09b2a3ca57827354631404ad20a07474624ee77777e3ef3c131372c70ab7743689e3d7e51efccae8de7cd80d0418665a10e8f4a21d0ee7810bdcec794f841defd22863cbca9fb8305e0b09ff5f624d8bcf4afa7eaf1b03035fde8bbf2dc9c0aca7a31982520be935a060e40b613e7ef6894e99d9a933a7afa1eb8085a03a2dbebd676f405ef44f5513ed14cb79c154b420b9a09db495354603417e7361e4db2897b3ff82d1c150dd6a5d4b26d60b8c27d8a01b44449f4266604f3f49f34be7c1d6ff9763afb0affee13359eda9f23a648d5f1282e7327ae04c8f66453d4786fd84f7e6e7500c9c95ad59170f4c031acd863c2cf66d184743d6e452e89076b3bf6edc041920feb265bfc598f56383d29a2de64c02bbf9a2696510a143796311dc85d7416a42c6199c9a381fb7ace989c483e88e3998d46e315151833f4047a3f210dfd6003b5e6955ba0a09a3f9ada1baaef6d09a82beedf4db09e3b2d0ee7ea106675be5d32fd6ee7cfe52c216da26379a7a64b9e1896e753d1fe20f3ffbba0be6e339f76f58043f3c66ef73a9e21695cb4a8e63711b2721f8d68c0eabd9407cdede7d11ee07b3c818a2bd081077cf06ab9b867f06948a0bf2e6e7e7ed2a9d430431c2bedb09ade4f2c42f01022f588b4cb53e733e21edac5e1e25e06f17875b19c4aa16529d3bce8f175a689ff7b897e8f346c4f8c7473fd309af04486b961c6a5538cf3bd6448a01a06cba3676636956b6f877bf3b111e0a3341c2d973f9a9234b425d1bdf0c11ee348025d1195ac45aa77b1d5a31eef64b2d90bb485bafcca95c213bc5e17c757ab6b4312dfbbc12d519bc1eaecde1b65cda97e3557a3daa6c52c0281cf6125008dfb703524562e1f0eeded2c9c36bea01eec65d798a10b01b725f83b5ac724df1162ce728a555cbf4da85570657da0f1b29df3ef7c7d1e8bd2f155902294b852d01d5ec71f8650fc6d85c2d2df10a12a7a461ead2d02477aac41dd98bf0ca2b6bd7f249266b2126919d0a6cf182b94ed07349d03b2fed15f3bbf69c678d77019a72e99fa1c3cca715ba615fab88e33f0f0e8bbb4c7b1f4f4ae776188549a5b29c1f30860fd5926fbc86997d6e7d3ca4d941ea5f061d373968ee19a7286f3af3516420ebb513d7870936cd2a8f96bf58a1557abe6c5816debb408fcc2af6c79c4f623cddbe62293609d5528e530c255359cd9e44a7e0ba2aefda33dd1c6132a17cf5d0fb6627156b91b9547c21be5f7861aa2331666422e8b932592199e25f052221a67246034e9498a9abf75823ddc39e74566c2ecb9865aacbdac1b570ad951a25cdd9ec988180df8ec99817f01e278f10b4a6dbef9a6c7722be2f5c03df8711fa6678c4f808bff10f7eff63f965074a4ee73244e177070acb9579c5f5c1f6b4bfe7f3b252c5b960821f67b88faf6fd727819479e140aa8592cc4f665f51fce1cc179b331c81cbebd0677dad1055979984071db0ad1896a07f4474871c622f690943ec8f5ea984efa76157c9151b981177448f033c6ef14bb34c20c7cb644e6ffbbd19b524f0fed20204879371369aa5ff678548557e938c42a58d64979726f4c688d5bb0b4911e0e751f2182e7f3cd4bdb8a96e60d038b6d3166f5b2dd04eace2cff54ac1287c8f3450b35387d9aa32b3ddeecef6cff8f1b9e470d9d598577952a68368ebde6d7e67e9898e9726096fb20922542943eed29fb6e68e2a402607471407eb3ed08b5b56f487f2c8ede175d757df03d5a92331519333abd547571d76360fd799ac6be18f239bd19f05dd1f94fedfba833b83e976db22910415dc71ac13f28ddef10783e1c0f9417172f8a043b6e96b57932b8f08aaf26d773bc16f8cce2d89d1d4aa33abec36f7406b32a3b3da7f1b7d749c40e544c9e44017b60afa17e653cfe383acac12f8a8ab0a735dfab70a95d5743ae6491b89d13924d3bad685775adac53b1926bf140ba13c7168de268ef2f344b2fffa8f79615221d0a1f5a96dbc46e7d96e83fea6051a8572a326a03c4e61a0e3bc1f017aaa1a23280d6f909c51f72dd9ce4347387dfe29f22418974e642215cd48b24405eac138a2ff3fad70496994d4a7261cd8a4eea2a2d12b797b6b0d2689bdb4778d6a51cd10021c4a9de3526a41cddc48eb578899e5cb74e364da70ff5736bc51d90b7e342003ec6eea783c031a11b20ef312af2ba4ec2552efe2274a682941111dfc21f883f207bb7be17417853a0d080decd27f850f56be120e00d9df76c825b12cb93720f18aa68dd1e136d41f5f4dfc5893b0eedd8c8e90c8937a681678fc7957faa7ec407496eb2617a05f0b4dc6c89a26d0be57c1f43525737065bb5e9b46316dd1a57babcbb5ed9b7733596051588f7deb3247e585acaa2b38338dbba3c5726a69f56e614056603e6073e6c0a795ece0b5c92875f4d9f1d08ab91b73d1acd014251db9aced5359ad33f6b599a45d3469fd0d60b7e91cd01aa24ba8be967805753d4e84a021c43c9389b6be0d68cb1543fc00c3df0a1894b24a5bfbb14d22c0f0e0133872f74b50b9de7ebe1f46df703288a4d20d0fc314bb2ad6bac8999d1d53d633ec002c3e2db3b2a5bf1dc903e5ea026e5b4ae7bf508a9748d6ce41b3e333299cfc456596acbb6cbb6e9963f650329657b5ef6961100c641f4bfa81de006d6f229bf17f1c6eb99afd4ad7713deacaf2482ff75d0143ba433068b540333fd5e7404a25ef7d07fa1da411a79492879c9f7458552be6326138b7199d2a3699a633f62d5fccd87b8eafe4dfa0b34c717dddc7f0266bd52cd57947bc014a78ce10b36f9faded4fb3b70ca3e0da88dc4d0c858dfce03be0469e6033f1441306b0563a9f020a25a663b8f410cea6659c938be8e17425dd6f26dd7746d5c08713e5396c0a6f547b5c0fc18c189f43eaca20e9e3052bcfc05b6e65862630032530a0a9d587e3807d592ca990d1fcd6a03e8bbff5a75e657b974c533d6f5a36ab3355b2fb048aa6e7ca11bbcc64251fb9993c7c18f510e0aa4006ac12a278bf726f7584529a4423dae19d142676d259ee948d2c125c48eee06143b922c33f5bf46e5ee34ee54feb723f765a3f7e3e70c32c05be5bf7960838fe7ee1d9946c3658c14bbfbc91fefee2fcc869365717669a82c949951182bcef946cf6f6c65ddc190b4618691e3b861191edcd35849482c9e49f9fcf0b3093e312c2241cc7027b21b94a1eb10039c796287cbed2ba93429ca2849b89828487b6cfd19beb81cc726cd706fd805642b57c3eae86505d067c5574f49a029480642d6d2c9a7ba78c71efbadf46079cb219231a09a25c3bbfd5605a9a9eb6363fcd9d4d73cff43890934fa6b3c80d7a487f29b82bd50afc7dc301c17752b3bfe495be7c7d5c16c71672417a891d8f") ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0\x00', r0}, 0xfffffffffffffd6f) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002200)={r3, 0x0, 0x1000, 0xe0, &(0x7f0000001100)="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", &(0x7f0000002100)=""/224, 0x2957, 0x1}, 0x28) mount(&(0x7f0000001040)='./file0/file0\x00', &(0x7f0000001080)='./file0\x00', &(0x7f00000010c0)='reiserfs\x00', 0x40000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000004e40)={0xa, 0x15, &(0x7f0000003d40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x80}, [@map={0x18, 0x6, 0x1, 0x0, r0}, @generic={0x6, 0x3, 0x332, 0x40}, @alu={0x4, 0x5, 0xf, 0x0, 0x3, 0xfffffffe}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, @exit={0x95}, @ldst={0x1, 0x3, 0x6, 0x8, 0xd, 0x32, 0x1}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7c159c25, 0x0, 0x0, 0x0, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x0, 0x95c8}], {0x95}}, &(0x7f0000003e00)='GPL\x00', 0x2, 0x1000, &(0x7f0000003e40)=""/4096, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x9, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r4, &(0x7f0000002c40)={&(0x7f0000002380)=@in={0x2, 0x4e24, @loopback=0x7f000001}, 0x80, &(0x7f0000002600)=[{&(0x7f0000002400)="19dd212d32636ce2b7ef2b6d", 0xc}, {&(0x7f0000002440)="8db03f925cb425d1209031eed49aa6c0fa3ff0570dd3c54943d3d87c90c4dfc147d9e0d62e2142964d19d63144bb49501e4aa1a0c457e5f4fcdbf4b39a3c67f54485da47d0ae32aacc451b766b1e9f7b28cf878b68d79c6c739aa1748ecba185ced115dc5a4772b5ff329ac0e78f044f812c182dbeed31c805f2b731757ab9662a27c5dbef780d9eb73570093abd48d2d9911f156b00a547c2078b4ac8a555ce1220861acbcfe80d414f5f1b4bd714f90ea82eeb2da326437cd332ee1e6a74780a7d4147024a158ceb537bfd37814b03182d1850c08e082ad854a593f6f086", 0xdf}, {&(0x7f0000002540)="64ee53172d9b4f054c2955e8cc09a7be7a51da0e4c8962af0c32d63182e872640d05f230be0f461caecdecd49d0e1129a5a8a4c5895a6a67f971b5075d82d463ed6cd598d996fcbb4654ae3fc67df15a52fcaaac5ad53857dcacf6c85df7d5fc4eb3624792a11fddc9c12314d9be97b17e14a3f6bc94042761c5", 0x7a}, {&(0x7f00000025c0)}], 0x4, &(0x7f0000002640)=[{0xd0, 0x0, 0x1, "d6bd0e188bb83e540603efc966663a6b4c966dd282be736215d572f91bc986ea7a8f6dc405e27d4331e8572d6d85f2963ace4c40db669ffe010be5599cdd507ffa485347fe2b14b9618f7c7bbad2cacc0b0b061941ade2f12be2b4ac5f432cd120846cc528a451b241dab43717c32dffb63bf19d5a20f2ff1a70f85209640ad4fecb848675821f16a86e5c55367635c55f35dc6ccedba1716afe25bcfdf9addcdb52c0303aa1f2c348ec33d02f35cfc8ba11d2da6ab0c230d93ee905475ae7"}, {0x28, 0x101, 0x40ec1575, "36b9bf6e157a76ac0a12c218c77364c89e495e2df75dc29c"}, {0xa0, 0xff, 0x1, "7af50e0195b8ed9088b84b47f11070581b8db59458509abfb25938a929a76b90e1070093af399edc6b79852de7d91deaa8fc888423c7b28dcc0e92adb775375100bd82c66e4208006cd8c1c80c3028dca030bedb5645b75e7ae1c8ce88964e30394ac31a9cbce2129fb0e28b766bd6c22c87cafea6cbeea846fd641d440f7299910c32c4d7b6e140e10a7bda06b5a3af"}, {0xb8, 0x118, 0x2, "f2cb9139856453afaccddc89154c2cca5132372f8927251f837714be512744e3d5af1998e9525f243c29b00d40df9baf19fc408a34351a45c1bb1b350e0a5bb6b3da5ef18eaa945084c02b50a0afab76bae52d05518145d208c5bb3fcf5f7913ba8192194e721428ac0d392a33f31e1f524e82e6075c93a0c011bdcf818d8a9e99e1f0f095d6fab286f5ae060e57f74286bc2516fe3f4527dec247e75d79645a5cd3d8"}, {0xa0, 0x1, 0x65, "0f85a10ae1611abcc9f2209b4b879157e1bf048a40ddaf26e470a55720a17a50509ce41b182c45b30beef9208128b4489a51f3b7e57a3fd23cfd97d3606c794eac1ca81239903d2a3b1f7c86c2319cbcc4bd253b6332342329a2bb9db380681f92faa2f4d777922242a42fa71530d113784084b2c1b3aa43f9efeb8f821bd893d527d40192cd4548968cf55cae1dd369"}, {0x40, 0x1ff, 0x8, "4eb6ce4a5744980e9f25838bb0d71532cb8d6354895b88f87b9767fa98ac9d3a1b85247fb7d54c6bc204"}, {0xc8, 0x117, 0x2, "b7379263687b2390aaec3d4ccf7220daf5dd30e289310266c1fe8c630a9dba8f2e35f80596f33cbe94678c277223473cf230cfd7ecd8b127cd5170f9f983200d36aa37bf012230047421e0990b4c7b514e0741722539b0703b3902aad58e44bf98d69512ef8ccfbbc791b314d6219fbf98297b39851cf7281e061bbaae56caafc88e2bf9a242f505399d289c7fee47935a11c45a6197f3f838c79a74c3707c6ec5c35b8d684943d212e4b328220f292d8a6d7081ba"}, {0xf0, 0x0, 0xde4c, "d9a2beb93465ff134a8d673c618c9970705b2d79a03a392e0c1d194707d0bc9747bb6c010ca1fd04e083fdc493deb180a77bf2ac264cc0f08110cb9fbc680a3570a8ecb595a1d9f61daf0e24256fead17d541e83b1329a06a3f1272e64af858a2eb5a2b482a2156c74474837a30c10740700ca52330b1e0e7b46a8053c96af07587be42603e51aec71c2477b692769ca4af7d1bef1b291fec07a7bfc3c112748bac868d43fbec7337b8866faa443ffddfe73d536742d352bec0fe8af4a314511e95c8dea4d11b82d8cbcc58fb7e46c92814c95eeca865c1b5c2d26c0cbf7b9"}, {0xe8, 0x129, 0x148b, "b255adea71f81aad35a7e008896900c66a08551b56af9cb59c82e4c48383cc7bff562981ebd021c3d070c9cb6e96b0c3132bf9e0f9095acb28ae11f1be9af3ff3c76628232deb575456436bf773e22ab70920b74c7fee0951755115d6d02b1a0c165059bd2680a5ce27f0ae51ae6bae31ac1cc1590849bc55459bf7286a947932953382e645ab8473801ab9dc0ff9408ef9f68c5eadfa9582a006a28bc12e21bc95d0345205e53b0fd545d8230205ffc2eb372f44e9c9ecf4b8fed9bd631ef582b43f96a3b01bc549686262189d279f7e2"}], 0x5d0, 0x20008040}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000002240)='./file0/file0\x00', &(0x7f0000002280)='./file1\x00', &(0x7f00000022c0)='cifs\x00', 0x4000, &(0x7f0000002300)="4fd9b3854cbcb3636e64927d5bf49f06fbe3fecab7b925620bdc31d40b7e741689abdc0899933985e63ec9d037f5cfc1e3e92a4f9d215de871b31757ca39b9a47bccd4f330e0e18c2f9023f4f767e25f082a1030904279f2d567c23faa6a23eb615378a3b4fd647070dbd68725cb3d0411b8") sendmsg$kcm(r1, &(0x7f0000000b80)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0xffffffff, @host=0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000009c0)="24ae378b3c8d38d1d258388598e79b75643bc6d5adeec5523a84d497e11ceb484fc0523995f20fc6e672d169348e52b7f389d090a95bbdfd089f2e2b0a07b1e638c2f267d52a9565dbae1e9b4c6ad35c3c8bd4e138f0279cd658b2dda504dcbb3b4fc7730a3117b27ab5cc084ae1006569a673428739ef54fd9a6e38230c09ce14c7cda8f6c05d64338df6a73f2f700e283d700bda04e70ac71e93ff5a2fdbf53c27b7c3c792a961a09f8366a4235b44f390e8c9760b88d1d428adf3d68780836a48528c0aaab79dfe5072d29b0375", 0xcf}, {&(0x7f0000000c00)="f3648a96e6be07f5c1fc932f9decd35c4fc3682a5d808a84dd84af8a974c7f051b63b3383507d23adca7f50ab35e6c575c268a89dd1836741f7b88b8cd60e5dfec8a64caff15afa50f32952c0bd8e31c0f2d149b7ea3bde3d9e873176b6ed5f9d9b298638dede92542a514ef9a21c96e52d5680b04cc203563e6e165d1fc414c", 0x80}, {&(0x7f0000000c80)="dbb68ef9f26c8ae6f39ab32b34433880dd8be3e215070ed3fe6e222576a23b4efb5091e23bcc54a240f48e99fc922b958c20d8ca710a7943214ad4c97ca5126034be7a101c97452644e403c9884320a81646cc242cbb80a293799057891a8f0e819030352e5280151be88dea196867a9a481fbbf09e63cc41e71331098dd", 0x7e}], 0x3, &(0x7f0000000d00)=[{0x48, 0x88, 0x5, "7e6c915a902d47e09c9a222fed0503717e02589925bda55cef24d18657e20a7b4cc5ebe7999b015a4499665b35265d6b567e565f8ceb"}, {0xc8, 0x10e, 0x8000, "5e306136897da46e579ee6c69d5d9872f214ee7e6c1522534adc903b2539ca6668b554f23be424dfc1b5cec2f2d01ed61e1fa026e260f6d19c716ca2fd76c8b2a6a021f08495bb69ee5fcb4ba50f7fda3629906f0a0e2ecc51361d9adba5b51b5a6a7437f475e3ed6057c9ae9dbed6ce47468c8562bc3fe8ded6d31139a44d28fbba013f9879355e53e0eccab6e072afb86005141701e0076e69fa846d5d4797564c92d8e10218b2a7e3b0e31f885ffde9f3"}, {0xf8, 0x11f, 0x0, "2a7b022560abd1e90639dd9242ebd2da66ee7aba97013921e484a5ea4d81045da059f794c0dd816cef98857126db48ae9fa80ade7881647866cd6b3a84e21933f3d602c0a7de77edd75481c60aa968dd4a27c5b1559a13148b2d5f93a8c3318d355ec6703e41d44080d3d5616ebfd4c461b2e8bb7055ee1c5ae794efaa69e7dad2358b77fd4d6dead4e9d3e68b1d852e96128c7f0e7ae95fba7f9d04db7d3b3b8ab31a459f9d1fa9ac6f0f1af6834fbc208a2f644ee98dd970db497d0b53b1ad70f010b4de5bcbc743b4fe0b36f71b0a1f253c070abd7330c458464d76b1a97b26dbeca43e94f5"}, {0xd0, 0x10a, 0xffffffff, "cdeece26dc53a995e3af05855f7cee96e5867f5668ca0aa8e25b36e775bfbcf4f7a838c1df8f64175675d76830b7de2f76bedb3f1880ee08b0606aef157eeef8e21124ce5e119d25c6d7f13bf6313c89c272452125e67326d7517748008b67046edfe99a245366370976f1a6e0e749dc8156df9c7bb0afae5c4c98ab34af8f8ef7ec2ee39ec364515a2d43783b218a4c99815672b033b6c043ca1608d43d5828941762df7a0acd9ca40a7ccd64388cc674c3098c1f57b7586664a23815"}, {0x60, 0x119, 0xff, "40304db524d6df219f320e6c9a26a90b6fdb7288cc909037973f519c64b420a008adc0cdb1bf472c8b9f79dc1e232391f2863084b14f6b5cae4cc3c2dffb071e4cae0d8826d43204e343"}], 0x338, 0x20000040}, 0x8000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:47 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x1fffe00000000, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x4000000001, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x4, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x202, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef2163e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) [ 638.663716] FAULT_INJECTION: forcing a failure. [ 638.663716] name failslab, interval 1, probability 0, space 0, times 0 [ 638.675083] CPU: 1 PID: 940 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 638.682191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.691546] Call Trace: [ 638.694145] dump_stack+0x194/0x24d [ 638.697783] ? arch_local_irq_restore+0x53/0x53 [ 638.702467] ? __save_stack_trace+0x7e/0xd0 [ 638.706824] should_fail+0x8c0/0xa40 [ 638.710553] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 638.715660] ? kasan_kmalloc+0xad/0xe0 [ 638.719546] ? kmem_cache_alloc_trace+0x136/0x740 [ 638.724391] ? __memcg_init_list_lru_node+0x169/0x270 [ 638.729579] ? __list_lru_init+0x544/0x750 [ 638.733810] ? sget_userns+0x6b1/0xe40 [ 638.737704] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 638.742468] ? do_mount+0xea4/0x2bb0 [ 638.746185] ? SyS_mount+0xab/0x120 [ 638.751728] ? do_syscall_64+0x281/0x940 [ 638.755791] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 12:28:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 638.761176] ? find_held_lock+0x35/0x1d0 [ 638.765254] ? __lock_is_held+0xb6/0x140 [ 638.769350] ? check_same_owner+0x320/0x320 [ 638.773681] ? rcu_note_context_switch+0x710/0x710 [ 638.778628] should_failslab+0xec/0x120 [ 638.782611] kmem_cache_alloc_trace+0x4b/0x740 [ 638.787200] ? __kmalloc_node+0x33/0x70 [ 638.791184] ? __kmalloc_node+0x33/0x70 [ 638.795170] ? rcu_read_lock_sched_held+0x108/0x120 [ 638.800205] __memcg_init_list_lru_node+0x169/0x270 [ 638.805241] ? list_lru_add+0x7c0/0x7c0 [ 638.809216] ? __kmalloc_node+0x47/0x70 2018/03/29 12:28:47 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 638.813213] __list_lru_init+0x544/0x750 [ 638.817290] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 638.823186] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 638.828223] ? lockdep_init_map+0x9/0x10 [ 638.832291] sget_userns+0x6b1/0xe40 [ 638.836005] ? set_anon_super+0x20/0x20 [ 638.839992] ? put_filp+0x90/0x90 [ 638.843449] ? destroy_unused_super.part.6+0xd0/0xd0 [ 638.848555] ? alloc_vfsmnt+0x762/0x9c0 [ 638.852529] ? path_lookupat+0x238/0xba0 [ 638.856584] ? mnt_free_id.isra.21+0x50/0x50 2018/03/29 12:28:48 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000700)='ufs\x00', 0x200000, &(0x7f0000000740)="e0bc05d6e7fae45d22135ff1ce3d0975b60b013d62646d23bb2028") r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 638.860995] ? trace_hardirqs_off+0x10/0x10 [ 638.865319] ? putname+0xee/0x130 [ 638.868772] ? cap_capable+0x1b5/0x230 [ 638.872665] ? security_capable+0x8e/0xc0 [ 638.876818] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 638.882007] ? ns_capable_common+0xcf/0x160 [ 638.886338] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 638.891526] mount_ns+0x6d/0x190 [ 638.894902] rpc_mount+0x9e/0xd0 [ 638.898268] mount_fs+0x66/0x2d0 [ 638.901637] vfs_kern_mount.part.26+0xc6/0x4a0 [ 638.906219] ? may_umount+0xa0/0xa0 [ 638.909837] ? _raw_read_unlock+0x22/0x30 [ 638.913976] ? __get_fs_type+0x8a/0xc0 [ 638.917870] do_mount+0xea4/0x2bb0 [ 638.921403] ? __might_fault+0x110/0x1d0 [ 638.925468] ? copy_mount_string+0x40/0x40 [ 638.929691] ? check_same_owner+0x320/0x320 [ 638.934003] ? __check_object_size+0x8b/0x530 [ 638.938506] ? __might_sleep+0x95/0x190 [ 638.942494] ? kasan_check_write+0x14/0x20 [ 638.946725] ? _copy_from_user+0x99/0x110 [ 638.950878] ? memdup_user+0x5e/0x90 [ 638.954582] ? copy_mount_options+0x1f7/0x2e0 [ 638.959081] SyS_mount+0xab/0x120 [ 638.962529] ? copy_mnt_ns+0xb30/0xb30 [ 638.966417] do_syscall_64+0x281/0x940 [ 638.970296] ? __do_page_fault+0xc90/0xc90 [ 638.974522] ? _raw_spin_unlock_irq+0x27/0x70 [ 638.979008] ? finish_task_switch+0x1c1/0x7e0 [ 638.983496] ? syscall_return_slowpath+0x550/0x550 [ 638.988430] ? syscall_return_slowpath+0x2ac/0x550 [ 638.993358] ? prepare_exit_to_usermode+0x350/0x350 [ 638.998372] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 639.003736] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.008586] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.013768] RIP: 0033:0x4548b9 [ 639.016947] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 639.024649] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 639.031911] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 639.039173] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 639.046435] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 639.053697] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/29 12:28:48 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000580)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0xfff, 0xfff, 0x18000000000, 0x1, r0, 0xbaa9}, 0x2c) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000740)=ANY=[@ANYBLOB="180000d896880508e7bfd989007006007b7fde9107a4cf985c78650dcb131577288a2469901c755fac3956c240f7"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0xffffffffffffff22) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000240)={r2}) 2018/03/29 12:28:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 1 (fault-call:11 fault-nth:31): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 7: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x0, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 639.261486] FAULT_INJECTION: forcing a failure. [ 639.261486] name failslab, interval 1, probability 0, space 0, times 0 [ 639.272813] CPU: 0 PID: 984 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 639.279920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.289273] Call Trace: [ 639.291872] dump_stack+0x194/0x24d [ 639.295511] ? arch_local_irq_restore+0x53/0x53 [ 639.300181] ? __save_stack_trace+0x7e/0xd0 [ 639.304516] should_fail+0x8c0/0xa40 [ 639.308229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 639.313325] ? kasan_kmalloc+0xad/0xe0 [ 639.317201] ? kmem_cache_alloc_trace+0x136/0x740 [ 639.322033] ? __memcg_init_list_lru_node+0x169/0x270 [ 639.327212] ? __list_lru_init+0x544/0x750 [ 639.331436] ? sget_userns+0x6b1/0xe40 [ 639.335318] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 639.340064] ? do_mount+0xea4/0x2bb0 [ 639.343766] ? SyS_mount+0xab/0x120 [ 639.347381] ? do_syscall_64+0x281/0x940 [ 639.351708] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.357072] ? find_held_lock+0x35/0x1d0 [ 639.361132] ? __lock_is_held+0xb6/0x140 [ 639.365207] ? check_same_owner+0x320/0x320 [ 639.369523] ? rcu_note_context_switch+0x710/0x710 [ 639.374459] should_failslab+0xec/0x120 [ 639.378427] kmem_cache_alloc_trace+0x4b/0x740 [ 639.383000] ? __kmalloc_node+0x33/0x70 [ 639.386964] ? __kmalloc_node+0x33/0x70 [ 639.390931] ? rcu_read_lock_sched_held+0x108/0x120 [ 639.395954] __memcg_init_list_lru_node+0x169/0x270 [ 639.400969] ? list_lru_add+0x7c0/0x7c0 [ 639.404935] ? __kmalloc_node+0x47/0x70 [ 639.408911] __list_lru_init+0x544/0x750 [ 639.412973] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 639.418854] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 639.423875] ? lockdep_init_map+0x9/0x10 [ 639.427932] sget_userns+0x6b1/0xe40 [ 639.431636] ? set_anon_super+0x20/0x20 [ 639.435613] ? put_filp+0x90/0x90 [ 639.439055] ? destroy_unused_super.part.6+0xd0/0xd0 [ 639.444149] ? alloc_vfsmnt+0x762/0x9c0 [ 639.448120] ? path_lookupat+0x238/0xba0 [ 639.452172] ? mnt_free_id.isra.21+0x50/0x50 [ 639.456625] ? trace_hardirqs_off+0x10/0x10 [ 639.460941] ? putname+0xee/0x130 [ 639.464390] ? cap_capable+0x1b5/0x230 [ 639.468275] ? security_capable+0x8e/0xc0 [ 639.472416] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 639.477593] ? ns_capable_common+0xcf/0x160 [ 639.481911] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 639.487184] mount_ns+0x6d/0x190 [ 639.490650] rpc_mount+0x9e/0xd0 [ 639.494009] mount_fs+0x66/0x2d0 [ 639.497376] vfs_kern_mount.part.26+0xc6/0x4a0 [ 639.501961] ? may_umount+0xa0/0xa0 [ 639.505696] ? _raw_read_unlock+0x22/0x30 [ 639.509834] ? __get_fs_type+0x8a/0xc0 [ 639.513722] do_mount+0xea4/0x2bb0 [ 639.517252] ? __might_fault+0x110/0x1d0 [ 639.521323] ? copy_mount_string+0x40/0x40 [ 639.525547] ? check_same_owner+0x320/0x320 [ 639.529857] ? __check_object_size+0x8b/0x530 [ 639.534357] ? __might_sleep+0x95/0x190 [ 639.538358] ? kasan_check_write+0x14/0x20 [ 639.542589] ? _copy_from_user+0x99/0x110 [ 639.546736] ? memdup_user+0x5e/0x90 [ 639.550441] ? copy_mount_options+0x1f7/0x2e0 [ 639.554933] SyS_mount+0xab/0x120 [ 639.558376] ? copy_mnt_ns+0xb30/0xb30 [ 639.562257] do_syscall_64+0x281/0x940 [ 639.566141] ? __do_page_fault+0xc90/0xc90 [ 639.570363] ? _raw_spin_unlock_irq+0x27/0x70 [ 639.574846] ? finish_task_switch+0x1c1/0x7e0 [ 639.579332] ? syscall_return_slowpath+0x550/0x550 [ 639.584250] ? syscall_return_slowpath+0x2ac/0x550 [ 639.589173] ? prepare_exit_to_usermode+0x350/0x350 [ 639.594180] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 639.599540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 639.604385] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 639.609563] RIP: 0033:0x4548b9 2018/03/29 12:28:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000000000000000000000181000", @ANYBLOB="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"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 639.612740] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 639.620441] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 639.627699] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 639.634956] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 639.642213] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 639.649474] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f 2018/03/29 12:28:48 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0xb, 0xe, 0x7fffffff, &(0x7f0000000780)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r3, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000740)=r4, 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 1 (fault-call:11 fault-nth:32): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0cca", 0xd1}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x1, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0xffffffff, 0x100000000, 0x10}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x10, r0}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") socketpair$inet6(0xa, 0x4, 0x8, &(0x7f0000000280)) 2018/03/29 12:28:48 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x23, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000", @ANYBLOB="0000000000000000fffc010000000000000000000000000085000000060000000000009500000000000000000000003ede3554d5cb01ff9fe510002f21d134f866066b82d35dcc018e181cf01668d9fae21d963b950b9a2f9e94e8b0a90b924af7af20b3413c602ab9f9b653698394def43782f0436eee133ee26e43c351663ef216a80b193bf15c727bbd732ddf55c7403e9578c5d146759cb7990df1f21a5c9dfb29bb3bbedc1e38139a43268cb6debcb0aa406fadb541e4e401e40c55d184dbd619d52217045ae0cc9038a582f9bdbc965331911242736d63c012e6d1da2822523bf63ead5342714d28395f130e7f0af220153ead3c38ceeead50ba96e13d2ea4c2f0c85a8fae"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/29 12:28:48 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='pipefs\x00', 0x10000, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000600)='./file0\x00', &(0x7f0000000980)='./file0/file0\x00', &(0x7f0000000a40)='logfs\x00', 0x8, 0x0) mkdir(&(0x7f0000000580)='./file0/file0\x00', 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mkdir(&(0x7f00000005c0)='./file0/file0\x00', 0xa1) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000240)='fuse\x00', 0x37002, &(0x7f0000000500)) 2018/03/29 12:28:48 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x1ff, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0x2, 0xa, 0xffffffffffffffff, 0x9}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") [ 639.783501] FAULT_INJECTION: forcing a failure. [ 639.783501] name failslab, interval 1, probability 0, space 0, times 0 [ 639.795153] CPU: 0 PID: 1007 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 639.802337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.811680] Call Trace: [ 639.814273] dump_stack+0x194/0x24d [ 639.817905] ? arch_local_irq_restore+0x53/0x53 [ 639.822570] ? find_held_lock+0x35/0x1d0 [ 639.826653] should_fail+0x8c0/0xa40 [ 639.830375] ? __list_lru_init+0x352/0x750 [ 639.834626] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 639.839741] ? trace_hardirqs_off+0x10/0x10 [ 639.844073] ? lock_downgrade+0x980/0x980 [ 639.848222] ? find_next_zero_bit+0xe3/0x110 [ 639.852628] ? trace_hardirqs_off+0x10/0x10 [ 639.856951] ? find_held_lock+0x35/0x1d0 [ 639.860998] ? __lock_is_held+0xb6/0x140 [ 639.865072] ? check_same_owner+0x320/0x320 [ 639.869394] ? lock_downgrade+0x980/0x980 [ 639.873529] ? rcu_note_context_switch+0x710/0x710 [ 639.878450] ? find_held_lock+0x35/0x1d0 [ 639.882509] should_failslab+0xec/0x120 [ 639.886465] __kmalloc+0x63/0x760 [ 639.889900] ? lock_downgrade+0x980/0x980 [ 639.894049] ? register_shrinker+0x10e/0x2d0 [ 639.898459] ? trace_event_raw_event_module_request+0x320/0x320 [ 639.904527] register_shrinker+0x10e/0x2d0 [ 639.908744] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 639.914524] ? memcpy+0x45/0x50 [ 639.917785] sget_userns+0xbbf/0xe40 [ 639.921488] ? set_anon_super+0x20/0x20 [ 639.925446] ? put_filp+0x90/0x90 [ 639.928889] ? destroy_unused_super.part.6+0xd0/0xd0 [ 639.933973] ? path_lookupat+0x238/0xba0 [ 639.938016] ? mnt_free_id.isra.21+0x50/0x50 [ 639.942414] ? trace_hardirqs_off+0x10/0x10 [ 639.946714] ? putname+0xee/0x130 [ 639.950147] ? cap_capable+0x1b5/0x230 [ 639.954046] ? security_capable+0x8e/0xc0 [ 639.958181] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 639.963354] ? ns_capable_common+0xcf/0x160 [ 639.967653] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 639.972820] mount_ns+0x6d/0x190 [ 639.976167] rpc_mount+0x9e/0xd0 [ 639.979511] mount_fs+0x66/0x2d0 [ 639.982855] vfs_kern_mount.part.26+0xc6/0x4a0 [ 639.987414] ? may_umount+0xa0/0xa0 [ 639.991026] ? _raw_read_unlock+0x22/0x30 [ 639.995155] ? __get_fs_type+0x8a/0xc0 [ 639.999035] do_mount+0xea4/0x2bb0 [ 640.002553] ? __might_fault+0x110/0x1d0 [ 640.006607] ? copy_mount_string+0x40/0x40 [ 640.010819] ? check_same_owner+0x320/0x320 [ 640.015139] ? __check_object_size+0x8b/0x530 [ 640.019629] ? __might_sleep+0x95/0x190 [ 640.023588] ? kasan_check_write+0x14/0x20 [ 640.027804] ? _copy_from_user+0x99/0x110 [ 640.031936] ? memdup_user+0x5e/0x90 [ 640.035632] ? copy_mount_options+0x1f7/0x2e0 [ 640.040124] SyS_mount+0xab/0x120 [ 640.043555] ? copy_mnt_ns+0xb30/0xb30 [ 640.047421] do_syscall_64+0x281/0x940 [ 640.051286] ? __do_page_fault+0xc90/0xc90 [ 640.055498] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 640.061021] ? syscall_return_slowpath+0x550/0x550 [ 640.065932] ? syscall_return_slowpath+0x2ac/0x550 [ 640.070845] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 640.076204] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.081042] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 640.086212] RIP: 0033:0x4548b9 [ 640.089383] RSP: 002b:00007fda96466c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 640.097071] RAX: ffffffffffffffda RBX: 00007fda964676d4 RCX: 00000000004548b9 [ 640.104322] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 640.111571] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 640.118818] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 640.126067] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 640.199369] ------------[ cut here ]------------ [ 640.204335] refcount_t: increment on 0; use-after-free. [ 640.209862] WARNING: CPU: 0 PID: 32094 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 640.217667] Kernel panic - not syncing: panic_on_warn set ... [ 640.217667] [ 640.225027] CPU: 0 PID: 32094 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #40 [ 640.232285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.241753] Call Trace: [ 640.244344] dump_stack+0x194/0x24d [ 640.247974] ? arch_local_irq_restore+0x53/0x53 [ 640.252643] ? vsnprintf+0x1ed/0x1900 [ 640.256442] panic+0x1e4/0x41c [ 640.259624] ? refcount_error_report+0x214/0x214 [ 640.264371] ? show_regs_print_info+0x18/0x18 [ 640.268851] ? __warn+0x1c1/0x200 [ 640.272286] ? refcount_inc+0x47/0x50 [ 640.276061] __warn+0x1dc/0x200 [ 640.279327] ? refcount_inc+0x47/0x50 [ 640.283106] report_bug+0x1f4/0x2b0 [ 640.286714] fixup_bug.part.11+0x37/0x80 [ 640.290754] do_error_trap+0x2d7/0x3e0 [ 640.294621] ? vprintk_default+0x28/0x30 [ 640.298662] ? math_error+0x400/0x400 [ 640.302439] ? printk+0xaa/0xca [ 640.305695] ? show_regs_print_info+0x18/0x18 [ 640.310184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.315020] do_invalid_op+0x1b/0x20 [ 640.318721] invalid_op+0x1b/0x40 [ 640.322158] RIP: 0010:refcount_inc+0x47/0x50 [ 640.326559] RSP: 0018:ffff8801d35a7860 EFLAGS: 00010286 [ 640.331923] RAX: dffffc0000000008 RBX: ffff8801c7d90344 RCX: ffffffff815ba4be [ 640.339183] RDX: 0000000000000000 RSI: 1ffff1003a6b4ebc RDI: 1ffff1003a6b4e91 [ 640.346432] RBP: ffff8801d35a7868 R08: 0000000000000000 R09: 0000000000000000 [ 640.353677] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d35a7af8 [ 640.360950] R13: ffff8801adf96a93 R14: ffff8801c7d90340 R15: ffff8801adf96b01 [ 640.368218] ? vprintk_func+0x5e/0xc0 [ 640.372009] sk_alloc+0x3f9/0x1440 [ 640.375536] ? sock_def_error_report+0x5e0/0x5e0 [ 640.380264] ? __raw_spin_lock_init+0x2d/0x100 [ 640.384826] ? trace_hardirqs_off+0x10/0x10 [ 640.389136] ? do_raw_write_unlock+0x290/0x290 [ 640.393708] ? trace_hardirqs_off+0x10/0x10 [ 640.398021] ? __raw_spin_lock_init+0x1c/0x100 [ 640.402585] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 640.407582] ? find_held_lock+0x35/0x1d0 [ 640.411630] ? inet_create+0x3fc/0xf50 [ 640.415502] ? lock_downgrade+0x980/0x980 [ 640.419632] ? lock_release+0xa40/0xa40 [ 640.423596] ? lock_downgrade+0x980/0x980 [ 640.427739] inet_create+0x47c/0xf50 [ 640.431437] ? ipip_gro_receive+0xf0/0xf0 [ 640.435580] ? __lock_is_held+0xb6/0x140 [ 640.439643] __sock_create+0x4d4/0x850 [ 640.443527] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 640.448455] ? user_path_create+0x40/0x40 [ 640.452604] SyS_socket+0xeb/0x1d0 [ 640.456142] ? fillonedir+0x250/0x250 [ 640.459928] ? move_addr_to_kernel+0x60/0x60 [ 640.464321] ? getname_flags+0x256/0x580 [ 640.468378] ? do_syscall_64+0xb7/0x940 [ 640.472335] ? move_addr_to_kernel+0x60/0x60 [ 640.476723] do_syscall_64+0x281/0x940 [ 640.480593] ? __do_page_fault+0xc90/0xc90 [ 640.484814] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 640.490333] ? syscall_return_slowpath+0x550/0x550 [ 640.495247] ? syscall_return_slowpath+0x2ac/0x550 [ 640.500163] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 640.505515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 640.510346] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 640.515522] RIP: 0033:0x4573e7 [ 640.518700] RSP: 002b:00007fffd43be8e8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 640.526395] RAX: ffffffffffffffda RBX: 0000000000000035 RCX: 00000000004573e7 [ 640.533644] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 640.540901] RBP: 00007fffd43bef90 R08: 0000000000000000 R09: 0000000000000001 [ 640.548159] R10: 0000000000000006 R11: 0000000000000202 R12: 0000000000000098 [ 640.555421] R13: 0000000000000098 R14: 0000000000000011 R15: 000000000009c314 [ 640.563385] Dumping ftrace buffer: [ 640.567127] (ftrace buffer empty) [ 640.570837] Kernel Offset: disabled [ 640.574445] Rebooting in 86400 seconds..