6329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5", 0xc6}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r2, &(0x7f0000000740)={&(0x7f0000000500)=@ipx={0x4, 0x9, 0x800, "bd47560c4284", 0x80000000}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000200)="1312295372", 0x5}, {&(0x7f0000000280)}, {&(0x7f00000009c0)="a63cb511aa2171de919318bc1e5d2bd3a95362ba397e31b2c60c3210f726a7f698cc77bab7459bb936a16a6677cbdc301515f4f70e0806d905e9ec08a74fccdfc1645619163e07e6c8c598982631c7abef86df26f4f3331ef8b6c424e5546483d678cd11c54b0b809c3717cab10eaef24c6971e25776685fe5a790af3aac6209559e04d3915d74ed223fa679abd5dac5162d447ef5379cfb", 0x98}, {&(0x7f0000000580)="d60e22a982c85d3fcfae438280a938e7a34868ad494cec277f9b849c3ad78817161ee557797ec832a9c75a210dbf04e7e3a5c08857724b2762aee414adcb59d329c2511902d2951a61d4366d55de12d68f6d7573810905caa04b902220c0b99f0ae37c9caabe15b8cbeb075c3afc65749f04fb0b15c6b0", 0x77}], 0x4, &(0x7f0000000c00)=[{0xa8, 0x100, 0x1, "c8bb4884226214a7f91467054df7b6b5999957baa417ea6e5c02969ccb1b12022bd360be15d029e335f2bf76e191dfea78e8ff9864ad85f70b57ead9aba330c726bd3739c822999be063c617f8b6531d1fe5324908aae284be0ef5bc3986b29f2cc02299bb234fb82a5c0b444a5316b69206631f3332ca896d0a262af244085ebfe2ef08f4db29acb1250f3ac4440f3a4c2a80f4b3b3"}, {0xd8, 0x101, 0x5, "3291ccaa26a2a37229ea96c4dcc6225f5dbb70c293d5e2e9d63f1b808c104f9221795ce262c8d3e8da1d7331be030bd0616da0a734aea5004101aba05d7bfda26fa9d8865caf1eb0a38803202f2275bdf0fdfc4d7385e99656f6a1da361756f3b4ab0848c4be963e794377da9adf6cdc1e724e9e44cd45599aebab4039878230b204132c05b4ea794c8a0cb353e4222755864a563c26f6349e123b06d29f35039ee95581a5d41abe30197c357b6dc45f4f245190e18d2bddd31a11158c232ac74a43c6dcca167f64"}, {0x40, 0x105, 0x2, "6a08f038afb01b5dc03036102e375bbd065fe524838a4ce1c875f1eeef8add2e8f868ede8fd4011ea0e4"}, {0xd8, 0x1ad, 0x1, "4faa778cb8f0c011794040bff6901385c99f53f6a98456d19a0a1d791732dab67b34b309a3cbb6c83df65321f9900c52de12b96f8736d91af20bef6804737e5343c48254d9441f450b1cf22573842eba3540c2dba8473993a347767b15a62eb0f1780461df1dfafbb33d027a93ec2144228ef142346e082e2e377421335f2e1a8f084189521016efa625861d31d05435096eaacd6df3ee06a4f231086cf4f2e13cfb4c376b463f39feaaff1c31615a53cd684c060a66925b280b6dd6b243a1d2d6e78217"}, {0x1010, 0x3a, 0x7ff, "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"}, {0x60, 0x10d, 0x1, "29e112c69018fd38c265642ffab7b757d257d74c43ed84f9215efcc938902327f86334dbaf9db3c20aad3fb4b0fdb696d7f63a65a4761dc71e36b7d1130f890c44f1c6ca13b7534f4bc6a3e8811fe039"}], 0x1308, 0x20000080}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/31 09:45:38 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:38 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r2 = gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) perf_event_open(&(0x7f0000000a80)={0x7, 0x70, 0x1, 0x400, 0x7, 0x5, 0x0, 0x2, 0x20000, 0x4, 0xff, 0x611, 0x10000, 0xb85, 0xfffffffffffeffff, 0x7, 0x2, 0x7, 0xfffffffffffffffc, 0xfff, 0x2, 0x70, 0x4, 0x4, 0x2, 0x1, 0x0, 0x2, 0x1, 0x5, 0xfffffffffffffffd, 0xfffffffffffffff8, 0x9, 0xffff, 0x1, 0x0, 0x72, 0xffff, 0x0, 0x1, 0x0, @perf_config_ext={0x7fffffff, 0xfffffffffffffff7}, 0x400, 0x81, 0x6, 0x7, 0xc4e, 0x7, 0x10001}, r2, 0x0, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:38 executing program 4: socketpair(0x0, 0x800, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x104, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x382) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={r2, &(0x7f0000000680), &(0x7f00000006c0)=""/166}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) socketpair(0x3, 0x0, 0x40, &(0x7f0000000140)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r0, &(0x7f0000000240)="c23d6dc5588a3957bd13215f31db21a0abb4096d1866b6be4a887c8abcd9882a8696c16036bda87eec8c20667016b33d1baac37a29fe7bdd67f3fbf921a8c1b8ee8a3aff2fe2e912dc8e7fa0b61ca1ef36945902c436f569ee2476f734840eaf1f35e43c6291c9124d0840537ac7e1d7c78e1d5a065f8994184d48eb154b9283a0f629c8", &(0x7f0000000180)}, 0x18) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000080)) socketpair(0x0, 0x0, 0x8c29, &(0x7f00000000c0)={0xffffffffffffffff}) mkdir(&(0x7f00000001c0)='/', 0x4) r5 = perf_event_open(&(0x7f00000005c0)={0x5, 0x70, 0xfff, 0xb2, 0x7, 0x7fffffff, 0x0, 0xfff, 0x1002, 0x2, 0xfffffffffffffffe, 0x4, 0x80, 0x8000, 0x823, 0x0, 0x4, 0x0, 0x14f0, 0x80000000, 0xfffffffffffffe01, 0x6, 0x7ff, 0xfffffffffffffff9, 0x200, 0x8, 0x76eb, 0x1, 0x100, 0x400, 0x3, 0x2, 0x5, 0xb372, 0x81, 0xfffffffffffffff7, 0xfffffffffffffffa, 0x8000, 0x0, 0x200000, 0x4, @perf_bp={&(0x7f0000000580), 0x8}, 0x20, 0x5, 0x5, 0x2, 0x81, 0xfffffffffffffffe, 0xfffffffffffffffe}, 0x0, 0x1, r3, 0x1) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0\x00', 0x51) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r4, &(0x7f0000000380)="e0e9be1cd631818bd806ab41576663b6866e1fb32c7ff0456e13eaa4d0006f557ee11ae988620c1262678b6e504edb044674a7fc86caeab5755f37d7dc2b632abe711b0a96eec1323e5c33f6e8df7bccb85b4c97a30810ac9a09f0d631c53103d0474cb332218821714bc7921e7504ff308d504a1cc1561e14841c6dae8e627c1b058bbef9e95521532b1b6fd815222c8012a2864467bf2b0054461b23eb53f4f4233bfb99e8184291963b8de354eb17b17c0a8765c750484d74b0fe2ed64b1912d52724e4f4989eb4e1fe8cc2cb5487fb848d13bd00022ae1e214718204462c9d016b2103a0a1567d3645d00fc78e", &(0x7f0000000480)="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", 0x2}, 0x20) 2018/03/31 09:45:38 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xffffffffffffff76) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000640)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") mount(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='openpromfs\x00', 0x81000, &(0x7f0000000b00)="026c651913cb87c437ee42fde2e6b40117cd7e0fe96f914819b9b636") 2018/03/31 09:45:38 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)}, 0x10) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 279.748126] FAULT_INJECTION: forcing a failure. [ 279.748126] name failslab, interval 1, probability 0, space 0, times 0 [ 279.759446] CPU: 0 PID: 21546 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 279.766716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.776053] Call Trace: [ 279.778623] dump_stack+0x194/0x24d [ 279.782234] ? arch_local_irq_restore+0x53/0x53 [ 279.786882] ? __save_stack_trace+0x7e/0xd0 [ 279.791187] should_fail+0x8c0/0xa40 [ 279.794887] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.799969] ? kasan_kmalloc+0xad/0xe0 [ 279.803836] ? kmem_cache_alloc_trace+0x136/0x740 [ 279.808660] ? __memcg_init_list_lru_node+0x169/0x270 [ 279.813827] ? __list_lru_init+0x544/0x750 [ 279.818042] ? sget_userns+0x691/0xe40 [ 279.821912] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 279.826644] ? do_mount+0xea4/0x2bb0 [ 279.830336] ? SyS_mount+0xab/0x120 [ 279.833944] ? do_syscall_64+0x281/0x940 [ 279.837984] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.843333] ? find_held_lock+0x35/0x1d0 [ 279.847380] ? __lock_is_held+0xb6/0x140 [ 279.851433] ? check_same_owner+0x320/0x320 [ 279.855740] ? rcu_note_context_switch+0x710/0x710 [ 279.860656] should_failslab+0xec/0x120 [ 279.864612] kmem_cache_alloc_trace+0x4b/0x740 [ 279.869172] ? __kmalloc_node+0x33/0x70 [ 279.873126] ? __kmalloc_node+0x33/0x70 [ 279.877079] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.882080] __memcg_init_list_lru_node+0x169/0x270 [ 279.887079] ? list_lru_add+0x7c0/0x7c0 [ 279.891038] ? __kmalloc_node+0x47/0x70 [ 279.894999] __list_lru_init+0x544/0x750 [ 279.899055] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 279.904924] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 279.909920] ? __lockdep_init_map+0xe4/0x650 [ 279.914308] ? lockdep_init_map+0x9/0x10 [ 279.918348] sget_userns+0x691/0xe40 [ 279.922042] ? set_anon_super+0x20/0x20 [ 279.926000] ? put_filp+0x90/0x90 [ 279.929436] ? destroy_unused_super.part.6+0xd0/0xd0 [ 279.934515] ? alloc_vfsmnt+0x762/0x9c0 [ 279.938466] ? path_lookupat+0x238/0xba0 [ 279.942506] ? mnt_free_id.isra.21+0x50/0x50 [ 279.946895] ? trace_hardirqs_off+0x10/0x10 [ 279.951201] ? putname+0xee/0x130 [ 279.954638] ? cap_capable+0x1b5/0x230 [ 279.958509] ? security_capable+0x8e/0xc0 [ 279.962642] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 279.967809] ? ns_capable_common+0xcf/0x160 [ 279.972113] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 279.977280] mount_ns+0x6d/0x190 [ 279.980629] rpc_mount+0x9e/0xd0 [ 279.983976] mount_fs+0x66/0x2d0 [ 279.987325] vfs_kern_mount.part.26+0xc6/0x4a0 [ 279.991885] ? may_umount+0xa0/0xa0 [ 279.995488] ? _raw_read_unlock+0x22/0x30 [ 279.999612] ? __get_fs_type+0x8a/0xc0 [ 280.003478] do_mount+0xea4/0x2bb0 [ 280.006996] ? __might_fault+0x110/0x1d0 [ 280.011049] ? copy_mount_string+0x40/0x40 [ 280.015261] ? check_same_owner+0x320/0x320 [ 280.019563] ? __check_object_size+0x8b/0x530 [ 280.024045] ? __might_sleep+0x95/0x190 [ 280.028002] ? kasan_check_write+0x14/0x20 [ 280.032221] ? _copy_from_user+0x99/0x110 [ 280.036351] ? memdup_user+0x5e/0x90 [ 280.040043] ? copy_mount_options+0x1f7/0x2e0 [ 280.044518] SyS_mount+0xab/0x120 [ 280.047951] ? copy_mnt_ns+0xb30/0xb30 [ 280.051818] do_syscall_64+0x281/0x940 [ 280.055685] ? vmalloc_sync_all+0x30/0x30 [ 280.059809] ? _raw_spin_unlock_irq+0x27/0x70 [ 280.064284] ? finish_task_switch+0x1c1/0x7e0 [ 280.068757] ? syscall_return_slowpath+0x550/0x550 [ 280.073664] ? syscall_return_slowpath+0x2ac/0x550 [ 280.078573] ? prepare_exit_to_usermode+0x350/0x350 [ 280.083570] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 280.088918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.093745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 09:45:39 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)) 2018/03/31 09:45:39 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x3, 0x9, &(0x7f0000000ec0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000001200)={&(0x7f0000001100)=@pppoe={0x0, 0x0, {0x0, @link_local}}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001180)=""/2, 0x2}], 0x1, &(0x7f0000001600)=""/4096, 0x1000, 0x8}, 0x20) recvmsg(r3, &(0x7f0000000e80)={&(0x7f0000000ac0)=@nfc_llcp, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b40)=""/230, 0xe6}, {&(0x7f0000000c40)=""/55, 0x37}, {&(0x7f0000000c80)=""/109, 0x6d}, {&(0x7f0000000d00)=""/93, 0x5d}, {&(0x7f0000000d80)=""/85, 0x55}], 0x5}, 0x40000000) gettid() recvmsg$kcm(r4, &(0x7f0000006200)={&(0x7f0000002c40)=@can={0x0, 0x0}, 0x80, &(0x7f00000060c0)=[{&(0x7f0000002cc0)=""/36, 0x24}, {&(0x7f0000002d00)=""/241, 0xf1}, {&(0x7f0000002e00)=""/113, 0x71}, {&(0x7f0000002e80)=""/4096, 0x1000}, {&(0x7f0000003e80)=""/4096, 0x1000}, {&(0x7f0000004e80)=""/121, 0x79}, {&(0x7f0000004f00)=""/4096, 0x1000}, {&(0x7f0000005f00)=""/65, 0x41}, {&(0x7f0000005f80)=""/226, 0xe2}, {&(0x7f0000006080)=""/46, 0x2e}], 0xa, &(0x7f0000006180)=""/84, 0x54, 0x4}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000006240)={0xf, 0x15, &(0x7f0000000f00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x5}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffff}, @generic={0x100, 0x1000, 0xfffffffffffffffd, 0x5}, @map={0x18, 0x3, 0x1, 0x0, r5}, @ldst={0x2, 0x3, 0x3, 0x6, 0x8, 0x20, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x1}, @ldst={0x1, 0x3, 0x3, 0x9, 0xd, 0x0, 0x10}, @alu={0x7, 0x401, 0xd, 0x85fe05166f23db68, 0x5, 0x1e}, @alu={0x4, 0x7fffffff, 0xb, 0xc, 0xa, 0x30, 0x18}], {0x95}}, &(0x7f0000000fc0)='syzkaller\x00', 0x7, 0xdb, &(0x7f0000001000)=""/219, 0x41f00, 0x1, [], r6}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r7, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r7}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r8}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:39 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)}, 0x10) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 280.098911] RIP: 0033:0x454e79 [ 280.102077] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.109766] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 280.117019] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 280.124273] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 280.131519] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 280.138765] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/31 09:45:39 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x888, 0x8}, 0xc) 2018/03/31 09:45:39 executing program 0 (fault-call:18 fault-nth:31): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:39 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x0, 0x64d8, 0x0, 0x14, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)}, 0x10) mount(&(0x7f0000df7000)='./file0/file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000000180)='pipefs\x00', 0x0, &(0x7f00000000c0)) [ 280.468357] FAULT_INJECTION: forcing a failure. [ 280.468357] name failslab, interval 1, probability 0, space 0, times 0 [ 280.479681] CPU: 0 PID: 21583 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 280.486955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.496296] Call Trace: [ 280.498865] dump_stack+0x194/0x24d [ 280.502486] ? arch_local_irq_restore+0x53/0x53 [ 280.507157] ? __save_stack_trace+0x7e/0xd0 [ 280.511487] should_fail+0x8c0/0xa40 [ 280.515202] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.520301] ? kasan_kmalloc+0xad/0xe0 [ 280.524171] ? kmem_cache_alloc_trace+0x136/0x740 [ 280.529004] ? __memcg_init_list_lru_node+0x169/0x270 [ 280.534175] ? __list_lru_init+0x544/0x750 [ 280.538387] ? sget_userns+0x691/0xe40 [ 280.542255] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 280.546988] ? do_mount+0xea4/0x2bb0 [ 280.550683] ? SyS_mount+0xab/0x120 [ 280.554293] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.559640] ? find_held_lock+0x35/0x1d0 [ 280.563687] ? __lock_is_held+0xb6/0x140 [ 280.567741] ? check_same_owner+0x320/0x320 [ 280.572046] ? rcu_note_context_switch+0x710/0x710 [ 280.576962] should_failslab+0xec/0x120 [ 280.580919] kmem_cache_alloc_trace+0x4b/0x740 [ 280.585479] ? __kmalloc_node+0x33/0x70 [ 280.589432] ? __kmalloc_node+0x33/0x70 [ 280.593385] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.598384] __memcg_init_list_lru_node+0x169/0x270 [ 280.603380] ? list_lru_add+0x7c0/0x7c0 [ 280.607334] ? __kmalloc_node+0x47/0x70 [ 280.611294] __list_lru_init+0x544/0x750 [ 280.615342] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 280.621322] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 280.626322] ? __lockdep_init_map+0xe4/0x650 [ 280.630714] ? lockdep_init_map+0x9/0x10 [ 280.634756] sget_userns+0x691/0xe40 [ 280.638449] ? set_anon_super+0x20/0x20 [ 280.642405] ? put_filp+0x90/0x90 [ 280.645839] ? destroy_unused_super.part.6+0xd0/0xd0 [ 280.650920] ? alloc_vfsmnt+0x762/0x9c0 [ 280.654873] ? path_lookupat+0x238/0xba0 [ 280.658916] ? mnt_free_id.isra.21+0x50/0x50 [ 280.663321] ? trace_hardirqs_off+0x10/0x10 [ 280.667626] ? putname+0xee/0x130 [ 280.671062] ? cap_capable+0x1b5/0x230 [ 280.674936] ? security_capable+0x8e/0xc0 [ 280.679068] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 280.684236] ? ns_capable_common+0xcf/0x160 [ 280.688545] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 280.693720] mount_ns+0x6d/0x190 [ 280.697075] rpc_mount+0x9e/0xd0 [ 280.700423] mount_fs+0x66/0x2d0 [ 280.703772] vfs_kern_mount.part.26+0xc6/0x4a0 [ 280.708337] ? may_umount+0xa0/0xa0 [ 280.711943] ? _raw_read_unlock+0x22/0x30 [ 280.716069] ? __get_fs_type+0x8a/0xc0 [ 280.719938] do_mount+0xea4/0x2bb0 [ 280.723459] ? __might_fault+0x110/0x1d0 [ 280.727506] ? copy_mount_string+0x40/0x40 [ 280.731722] ? __check_object_size+0x8b/0x530 [ 280.736201] ? __might_sleep+0x95/0x190 [ 280.740160] ? kasan_check_write+0x14/0x20 [ 280.744373] ? _copy_from_user+0x99/0x110 [ 280.748502] ? memdup_user+0x5e/0x90 [ 280.752194] ? copy_mount_options+0x1f7/0x2e0 [ 280.756673] SyS_mount+0xab/0x120 [ 280.760106] ? copy_mnt_ns+0xb30/0xb30 [ 280.763979] do_syscall_64+0x281/0x940 [ 280.767844] ? vmalloc_sync_all+0x30/0x30 [ 280.771969] ? _raw_spin_unlock_irq+0x27/0x70 [ 280.776441] ? finish_task_switch+0x1c1/0x7e0 [ 280.780914] ? syscall_return_slowpath+0x550/0x550 [ 280.785822] ? syscall_return_slowpath+0x2ac/0x550 [ 280.790730] ? prepare_exit_to_usermode+0x350/0x350 [ 280.795725] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 280.801072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.805898] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.811064] RIP: 0033:0x454e79 2018/03/31 09:45:39 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0x0, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:39 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x6, 0xd, &(0x7f0000000380)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfff}, [@jmp={0x5, 0x6, 0x7, 0xf, 0x5, 0x30, 0xfffffffffffffffc}, @ldst={0x2, 0x3, 0x3, 0x6, 0x0, 0x4}, @ldst={0x0, 0x1, 0x7, 0x0, 0x0, 0xfffffffc, 0x1c}, @jmp={0x5, 0x8, 0x0, 0x0, 0xe, 0x2, 0x14}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5}], {0x95}}, &(0x7f0000000400)='GPL\x00', 0xff, 0xce, &(0x7f0000000600)=""/206, 0x41100, 0x1}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000780)={0x0, r0, 0x5, 0x3}, 0x14) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x200000000000000b, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180200000000000000000000028000008500000027e8e987c79d8590aa9b268b5f0000000500000000000000950000000000000010ac125b1f7211338c2f3efd55f5d03156546a2d676862f473cb6bb9365da921c8afbf5a145d385db448cc1d0403708263bdaa363c1b5df5d119aeee55f68b9a21ae5cd720b6db5ab6fdd5ddf7db352084ccbc090664b52d86a6fdeadcb24d82066291f492a91c614acd7fe1bcd432c163466b4480d1eef3944e6d692a6b670844a6be47e0"], &(0x7f00000000c0)="00007bf056c718041899f95b1a", 0x1, 0xce, &(0x7f0000000100)=""/206}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xffffffffffffff9a, 0x6e, &(0x7f0000000040)="7ee3785603ce89e709d68e7a47c8", &(0x7f0000000200)=""/110, 0x0, 0x3}, 0x28) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000018040)={&(0x7f0000017e40)=@hci={0x0, 0x0}, 0x80, &(0x7f0000017f40)=[{&(0x7f0000017ec0)=""/128, 0x80}], 0x1, &(0x7f0000017f80)=""/166, 0xa6, 0x40}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000018080)={0x5, 0x4, &(0x7f0000000480)=@raw=[@ldst={0x1, 0x3, 0x3, 0x3, 0x1, 0xfffffff8, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}], &(0x7f00000004c0)='GPL\x00', 0x9d, 0x34, &(0x7f0000000500)=""/52, 0x41f00, 0x1, [], r3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/31 09:45:39 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)) 2018/03/31 09:45:39 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffff8001, 0x0, 0x0, 0x0, @perf_bp={&(0x7f000031f000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) close(r0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000b00)) r1 = getpid() perf_event_open(&(0x7f00000009c0)={0x3, 0x70, 0x6, 0x7fff, 0x3fc0, 0x5, 0x0, 0x800, 0x0, 0x4, 0x4, 0x3, 0x1, 0x0, 0x1, 0x0, 0x8001, 0x75, 0x7, 0x401, 0x4b, 0x80000000, 0x5e2, 0x7fff, 0xfffffffffffff000, 0x7, 0x7, 0x1000, 0x20, 0x7f, 0x100000000, 0x1, 0x5, 0x800, 0x2, 0xd0, 0x2, 0x80000000, 0x0, 0xffffffffffffffff, 0x3, @perf_bp={&(0x7f00000004c0), 0x9}, 0x1100, 0x1, 0x1, 0x0, 0x5, 0x3, 0x9}, r1, 0x3, r0, 0xa) sendmsg(0xffffffffffffffff, &(0x7f0000002dc0)={&(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x1}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000500)="6b733ef3dfe7c083602cec12a9bb465f4ce2361844682170007c0a460186bf2067e9fadb59159fd2670396a2ce971f06f13de483ea065bc5352b0c7b48d10a10f954fef462f7a3a4d7277633e218b6c93c8bdbea3eea85e023c83c9b6433a04dc551839a363cd4275a15f9ac3fdfb93a9cf65fe1d7c3a64d49c9df4b65c5092b42018f46c8ebd1a7a9dd7b4ca173cc464a66b774da3e54c38715a0171fbbf1a44b183f9f7a0593ea9f", 0xa9}], 0x1, &(0x7f0000005540)=ANY=[], 0x0, 0x80}, 0x11) recvmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/55, 0x37}, {&(0x7f0000000200)=""/216, 0xd8}, {&(0x7f0000000100)=""/133, 0x85}], 0x3, &(0x7f0000000340)=""/115, 0x73, 0x1}, 0x12040) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x80000000000001, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) recvmsg(r3, &(0x7f0000001980)={&(0x7f0000000180)=@can, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000240)=""/245, 0xf5}, {&(0x7f0000000340)=""/7, 0x7}, {&(0x7f0000000380)=""/114, 0x72}, {&(0x7f0000000400)=""/242, 0xf2}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000000600)=""/11, 0xb}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/226, 0xe2}, {&(0x7f0000001740)=""/88, 0x58}], 0x9, &(0x7f0000001880)=""/242, 0xf2}, 0x12103) perf_event_open(&(0x7f00000019c0)={0x0, 0x70, 0x0, 0x7, 0x7, 0x9, 0x0, 0x8, 0x1, 0x0, 0x8, 0x4, 0x2, 0x0, 0x2, 0xc47, 0xffffffff, 0xda2, 0xfffffffffffffffd, 0x100000000, 0x5, 0x1, 0x100000001, 0x0, 0x8001, 0x8, 0x4, 0x5, 0xe, 0x0, 0xfffffffffffffffa, 0x2, 0xfff, 0x0, 0x0, 0x200, 0x1, 0x0, 0x0, 0xffffffff, 0x3, @perf_config_ext={0x4, 0xfff}, 0x1, 0x400, 0x4, 0x3, 0x8, 0x874, 0x1}, r1, 0xd, 0xffffffffffffffff, 0x8) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000030c0)={&(0x7f0000002e00)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e80)=""/85, 0x55}, {&(0x7f0000002f00)=""/151, 0x97}, {&(0x7f0000002fc0)=""/50, 0x32}], 0x3, &(0x7f0000003040)=""/122, 0x7a, 0x15}, 0x101) perf_event_open(&(0x7f0000001a40)={0x2, 0x70, 0x3, 0x2, 0x3ff, 0x8, 0x0, 0x4, 0x20, 0x6, 0xff, 0x200, 0x3, 0x37ba, 0x0, 0x288, 0x7ff, 0xf18f, 0x80, 0xfffffffffffffffe, 0x80, 0xffffffffffff7fff, 0xfff, 0x9, 0xb5, 0x3, 0x8, 0xa804, 0x10000, 0x7, 0x6, 0x1000, 0xedbb, 0x6, 0x1000, 0x3, 0x3, 0xffffffff80000001, 0x0, 0x8, 0x1, @perf_config_ext={0xfffffffffffff5e7, 0x101}, 0x100, 0xd9, 0x4, 0x5, 0x2, 0x7, 0x1}, r1, 0x4, r2, 0x2) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000003140)) mkdir(&(0x7f0000000480)='./file0\x00', 0x400000) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000003100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000590ffe)='v2') 2018/03/31 09:45:39 executing program 0 (fault-call:18 fault-nth:32): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:39 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x1f, 0x1a}, 0xc) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:39 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0xe) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 280.814230] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.821920] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 280.829168] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 280.836418] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 280.843668] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 280.850916] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f 2018/03/31 09:45:40 executing program 2: socketpair(0x2000000a, 0x80003, 0x0, &(0x7f00000001c0)={0x0}) socketpair(0x9, 0x1, 0x4, &(0x7f0000000000)) 2018/03/31 09:45:40 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:40 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)) 2018/03/31 09:45:40 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0x0, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 281.188485] FAULT_INJECTION: forcing a failure. [ 281.188485] name failslab, interval 1, probability 0, space 0, times 0 [ 281.199789] CPU: 1 PID: 21617 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 281.207060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.216406] Call Trace: [ 281.218979] dump_stack+0x194/0x24d [ 281.222590] ? arch_local_irq_restore+0x53/0x53 [ 281.227244] should_fail+0x8c0/0xa40 [ 281.230939] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.236027] ? trace_event_raw_event_lock+0x340/0x340 [ 281.241202] ? trace_hardirqs_off+0x10/0x10 [ 281.245502] ? lock_downgrade+0x980/0x980 [ 281.249636] ? trace_hardirqs_off+0x10/0x10 [ 281.253939] ? find_held_lock+0x35/0x1d0 [ 281.257991] ? __lock_is_held+0xb6/0x140 [ 281.262046] ? check_same_owner+0x320/0x320 [ 281.266350] ? rcu_note_context_switch+0x710/0x710 [ 281.271257] ? rcu_note_context_switch+0x710/0x710 [ 281.276173] should_failslab+0xec/0x120 [ 281.280126] __kmalloc+0x63/0x760 [ 281.283558] ? __kmalloc_node+0x47/0x70 [ 281.287516] ? __list_lru_init+0xcf/0x750 [ 281.291644] __list_lru_init+0xcf/0x750 [ 281.295601] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 281.301463] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 281.306465] ? lockdep_init_map+0x9/0x10 [ 281.310508] sget_userns+0x6b1/0xe40 [ 281.314199] ? set_anon_super+0x20/0x20 [ 281.318155] ? put_filp+0x90/0x90 [ 281.321588] ? destroy_unused_super.part.6+0xd0/0xd0 [ 281.326669] ? alloc_vfsmnt+0x762/0x9c0 [ 281.330626] ? path_lookupat+0x238/0xba0 [ 281.334668] ? mnt_free_id.isra.21+0x50/0x50 [ 281.339060] ? trace_hardirqs_off+0x10/0x10 [ 281.343363] ? putname+0xee/0x130 [ 281.346800] ? cap_capable+0x1b5/0x230 [ 281.350669] ? security_capable+0x8e/0xc0 [ 281.354799] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 281.359970] ? ns_capable_common+0xcf/0x160 [ 281.364272] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 281.369439] mount_ns+0x6d/0x190 [ 281.372790] rpc_mount+0x9e/0xd0 [ 281.376142] mount_fs+0x66/0x2d0 [ 281.379496] vfs_kern_mount.part.26+0xc6/0x4a0 [ 281.384067] ? may_umount+0xa0/0xa0 [ 281.387679] ? _raw_read_unlock+0x22/0x30 [ 281.391809] ? __get_fs_type+0x8a/0xc0 [ 281.395681] do_mount+0xea4/0x2bb0 [ 281.399199] ? __might_fault+0x110/0x1d0 [ 281.403243] ? copy_mount_string+0x40/0x40 [ 281.407457] ? check_same_owner+0x320/0x320 [ 281.411759] ? __check_object_size+0x8b/0x530 [ 281.416237] ? __might_sleep+0x95/0x190 [ 281.420195] ? kasan_check_write+0x14/0x20 [ 281.424407] ? _copy_from_user+0x99/0x110 [ 281.428534] ? memdup_user+0x5e/0x90 [ 281.432228] ? copy_mount_options+0x1f7/0x2e0 [ 281.436704] SyS_mount+0xab/0x120 [ 281.440136] ? copy_mnt_ns+0xb30/0xb30 [ 281.444006] do_syscall_64+0x281/0x940 [ 281.447878] ? vmalloc_sync_all+0x30/0x30 [ 281.452004] ? _raw_spin_unlock_irq+0x27/0x70 [ 281.456484] ? finish_task_switch+0x1c1/0x7e0 [ 281.460961] ? syscall_return_slowpath+0x550/0x550 [ 281.465868] ? syscall_return_slowpath+0x2ac/0x550 [ 281.470778] ? prepare_exit_to_usermode+0x350/0x350 [ 281.475774] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 281.481119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.485949] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.491117] RIP: 0033:0x454e79 [ 281.494285] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.501977] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 281.509224] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 281.516471] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 281.523719] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 281.530967] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 2018/03/31 09:45:40 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='adfs\x00', 0x0, &(0x7f0000000ac0)="e456ad6f136e14a80fa1c59708b81c0c6f010be0611428fd07b920690241642a2ad0ad1ceafe910e58cdd6ecf6133ea42c1c601737af7d9be4c4090f1ade7a2d6e9f293bba8b646a3f5018379e9f191dfb3579fcd92256543ee23ee006f2240732290e18a4811ffc66d65adb765b71d7ae91d0f7cada1367df5b44e99e15d77eb888c75a72645ac09810516363e03bcdb7afd830de201113c1bc132a2edef688d3f71c0783e16b42602f0b2087db007d2f0fd8a75d1348bbfd978e527ed485ffb29cbe0b575915759e4198c6c044bc4a132e") bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:40 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000ac0)={r1, 0x0, 0x10}, 0xc) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000002100)={&(0x7f0000001d80)=@hci={0x0, 0x0}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001e00)=""/14, 0xe}, {&(0x7f0000001e40)=""/253, 0xfd}, {&(0x7f0000001f40)=""/103, 0x67}], 0x3, &(0x7f0000002000)=""/199, 0xc7, 0x5}, 0x41) sendmsg$kcm(r2, &(0x7f00000056c0)={&(0x7f0000002140)=@ll={0x11, 0xf7, r3, 0x1, 0x1000, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x80, &(0x7f0000004540)=[{&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="deae3ac9e5004021bb01bf8c29f232532127264062c2a589046c15cd269afcb3048c7916dbc23185f8f0d242e78c7c9fac573d14c92822d03d49ec134daf4f9401eb68e6a6a0db9d935dd11e3edc7eb6746b90c5899d542a04a002500ea795e7cd7c03168fa952e3b6c9954091820bc3b15c45bfe8161c7e7cf10ea570ff53dbaf26ad5f1f78b20b918b5478e6daeee74c0d8cc3a8e5cad99e2ab7afa8e4d84d739164f08c5a5d13a8fbfdf1b0d1baf85655ba9b3f21e21e77177feb0d7834a5e9029ea20399155012dda45d9f9001e97a4d71f5414f87952a89de303c", 0xdd}, {&(0x7f00000032c0)="6d7585eb1197d9e7866011bc7f805daf6c55eb132768a0972f8c9441b72e3e319b60496f4a1ae3a8f41519300d6b8532e0ccfd6e03ce211d40215b0bcd761a31a32827e1cb9a0b023e1c67882c4a123d832c4f5f888ad8d79a77dbac1c023d3eeff596ab809b0dd070332fb2250bb158443aca9c772df58dd15a14c9cd7f6865c4c05b9dea99a4df7df8443ed168e51770f7a5b277f5be6c49263a6a29ad28c03da5a6bb253e8e0a9e5dc3", 0xab}, {&(0x7f0000003380)="b0ff7e25a47c278b92387063781272aceb640cb0790027c02ffd3897fac9a2c6022f3f28eda1f452e57601b28ba94c7a23438cb078ffb0bc8dc5862735702664b7ad12a710126c57d9efa4169c4c143ecf90ecf20df565e0f1fac35f29997f2f997c9a54d00f962c59d522cf645892adddf5", 0x72}, {&(0x7f0000003400)="a02c6339499bed479a6b0dca57dbae8af51903f6b9f591b814bccc55ea329e64ee49a99aa304cbdb665ab7bde04c1eca88d39bc0ed21b436dbcd9fd1b0dd10cae195d78a81460bacb3e22bcc794e5aeaf65a012e538e829aee3a15a59e138e37f2749481786d1748d31aa0f2c0b2bc87ebe79cffac3e2de4e90d12646b64991bfc70bc8e3926446439f97c51b52ac86c95e3ba844e615e48e84ad7dd2200947f100c63cd2c6dd504c04a30b088691a811b09c5b05e84273c37fc19b16e97160ca5f1b784fc3759b77c21eadefc2e063e0dbdbf98d2a9430318441596640b88c2ce", 0xe1}, {&(0x7f0000003500)="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", 0x1000}, {&(0x7f0000004500)="cc40a5f7572fea447987ba7a8961cd9115697b1480ad3259d56d3fb05555ee14c5e5e9e18cc858a7abfb48db74de674d6a7783be17b490456422008bdccc", 0x3e}], 0x7, &(0x7f00000045c0)=[{0x30, 0x13f, 0x1046, "f3d327fc20fea407ac7ba4bdde50973c7a59bb9ca1a735ba6d1634df"}, {0x1010, 0x119, 0x6, "a7ab87815c2dea21972bba4c2944dbfa67a21c792f196ded2c0e0f2a5e1454c878644effc820b447a7cadeb1878da53cf655afe9710b5bd6902eb380396fc43c0bda49b395cf870b2c792bb806a32af251b15a858e1507a197695c7dfbd3495084e697e2d3fc3790b4c3cec72bc792dee28ee2216b275a8dcaa0ecea77bf27fe4d2fc431f2e48d1e6675d63355ca9fcc08030dc99280d17880c3f9f4892bfd5e591927683bd487e47d37c31d539957c8f5a41e9701949d3277e4a2b7a9cf1c217c86bd7ded8d8d495aba8410799e170cc71d6d1ec1d53454aa94216da87f5e3d8fc1f327900f183ef37d648ad4040620e35d3e9d911f42bfca07ca02a79a7c8ae507bd92932dc5ff5ee9a8898b7a998f34e84077572b4804a33d082a1a70bda9137ea4255686cc88aadf40cd8909f4ef466ad40bfb3186a27e5d65a275194fc389363f733a9a7854e5f8f7a04c10cf6287f5aad34d886ae98b563f43b3fff2ffd9235ebfaf9ef4af5ea5bebdf83fc52ef9462b4588f2cfcd1c4e474b5ad95aaade0841dae72c54624709853a507b1e4c16931c2362a11fa748ced0ca33b05ff49dca848967d2deeb72c50c1605b44cd8e978d16dcbf795d325c2deeec7766818cf40b62e610186895469251b3004dd1b4aee0b47a34c128172caff205a093eaa707c22b53c00de7b9b8ad2edad4d77b66c79066dae4a8aa2a0c10f79f44f1987ce15b6140bd1d09815b81b8fe7907b08533eae698ddb0839ddc53612000f39b044c42da49a57b724d08df4c611a49b36aadd4774028eb64de5c6d314f5862af3944d1750b0b910d63abad8bf5e11baf7f943a456a81a37104c3860f602e4a8770e0e77070037a9021445a369888efa59a2f69d8ed91c8b21be6dd01cd14c083d934746f4663d3a7698fa00ced9ff1650ff8df1b3e64302e590fa89bfa914b829275f46b2f3eaac4b217486d66e5da3b1a6f750129e6f737654ce4307ea4e05d1be805aa56a03884a97f48a0ab55a544ba6b2622156bc8e502a40539dda58022b4a0e20fd2b306a79f649fe55ebf9d546ad7d46b5350e785e3f947f5c19aaacd0cf94e24142362f07d964de63134c180e2bedadb7a9a804477cb770c55f04b2f88f10bc9cf61b2563f461d5afb1181c00ceb2e3ef7aceac62b9f1fa9c4670e12bf79e05d7831bcdaacb4a51a719fca70d50d3eaa86ff278dbde04bc7f59da9ca0feb6d537836e1996f9f5c2eb719b73dc5f4e86ce32493c4d3f1d6fbeda45380dd8471bf314a5a43501fe3a5926c63c4ea868534126ecdfb8d4fe9d75e829c39f873e012c4d5e97e7dd889bd5cf79763f1fd132943a5ed337a260b839d6605d7cd505b7ffb0931ed21c138b3b47af7dfe17eac6e3973ad0a498de40e5e40f043253e88d494eaa1ed65aaf7ba418f9a518be6632829f4bd8b348c61331064aed72113206ae8714faeb244caa841166829649a102ae39d70954cab852a6d97c64e84ee11c0fb92f3258b1a2d2a1c93c1ffce79b585fe8099c982ef38230b8efc28c7df06720ef584a47ec8bdfa8eabd274ea5fe0bb3210dbd6d6cdac446f73283762306e7f67a3f8a8d94fa93a410d5e3efdfad1f63128ca8f75b2f07c3fbaa4cb8a08df32026ea6d0dda33e38162757ce2eb20bb1e82cbf28afcd4132fe050b9d09cbfb803fa37c31972acbdfb86a321bde32b94a947856fe4203d7f9db978f0854d96d833cce460e87d45ca40c8d0ba00727293901b3bb4dd3fec2f5d874fed10465ede2c21d1b0689f98ad19e4fa5f04c0449b738d5090afd1e36f25b8d023cc780518266d4b96f927cf9d818fa9fc936a6244a51efb8b4fba675495d316374116a4476cb1c122a04854c207002ec70b9ab00372cb48805c98053fadf9cc686a0b07998490528293e12c496d298e367009c4a69d2e68b78adb6ce8f953978ef7e2873f4de9501597d14a3dd8920f40ae63d1be909f7e87074404c0f2a8c3cd73009b49167f38f09c5831dfb8db17ab1a6a837c6defd24c27ffd5d02af243a07380f0f73f394f76bed44d7b2c2b885d0aa3876828f57312a11e2f2c16d623442073b9621817611b69d9e329f1392d5450d3d3650b7c08319f05ec03a48601de93478e66a735c071b5db7a465523c49e9578999f0519008a85663d0d9642a89ae742c170e9d224386e386db83f9e2f10439eab9953844182385ae00873e2ed25d1982161f5393dcda76245a29b4550144f2cdd88dea68266ba7e8939a61704611af327fa511dea1fda0c14a958a79ee426d13d8a38cf6806ca59f45e4fb7170148a310722db12854dbd686f0f95fd62dd898e5357925f3a5df4f24f01754f7f78f8f7fe078bfd1d638a917a5892fc7bfb50f58fa32201bd01e90db6198a89ea3290bd2a36cc6391a39b3de7ebbe8199145728ca4194cf6bde2989893725eaefe81118a7de2688000a69cb2d33decba1223cd931c75a5bf587798e1a6259c86e5f5ddc7f48bf5ea160bd3e96e661902e3c9b302ace973284a6d89eea927a6dd943a55309c9a3cdc1afd322439943963657d12d76bb86e410958acb70b72b78fb45eda77de6637e429ff7e2420d1449ded98442cb17d31ee1a0d9391a32aeb32615bad0b09a9b057ea06532ca21ea17709215e8e9b88a1ad99f0bd7c396129ca6b5d2be964f78365612e99f776eef9b3ab6baae7b691293c770e432a1cc40f9717447cdf51e73b4793ee34122bf1451b02924093f2acc03f2e6f3de9c49e559831cabca8dc8a85a3aeb24ad9488b27de0eadedb16fd2d57dc3f5a59bd8d152761074cdb1da8e6a628d8e2dd67126819f5d6152cf1b1c61ef8745aa5ca57b00ba2d12be17aa9bad955cb1a9789a823c47a04f795a34e35e421115e1a31360a9ba7664b9ab42e538eae61fbb051bd5af04e738c1be59920d4e7e392c5f3a0fb77d84d93674f082198aaae33cd5a9449f0cdf88323f825a6f68842fec82c8a7d222303426abd3e73da2a4f687dae7c6ef89c8d9f44d1023a93bdd514360c2e5c73b5e4ce2cf786dadd91bd15d76bcd8913a0e0908c53de838069ebc0ea26b58db1e85438d0cddefcef6e4da54e6c6611424e6442104bef869a20212776eb943f6a636f6ba3be40f96df1a3b83e7416b3d3abe020846e1acf38b6e08a7a92900a22827b2be60df20fb29599a7c969538a7804ea959022b00811042ddb21eedc51e792fede13347dbee3728315c50e6d443c06f3c6bb949cab77eb4ec8c0b114220e071ab211dc7fb1d787bc4f45f5ffb7a3b00e8f15ec58fdcf6cc7fb84f777984ad85f8c23ea1c1130ef51aeb009c27c9caa1516d53ea9642710243c4e3fb45ca8501bc5026cb7844857457195be8e2a9b6ebe437d394471088102ee531018da383c31e0a91e74cffc43810757df5fc492db970234d87e7afb632c78968e873674698e881e72b74cd61061ce02f74aff6c8b7c96f3f8a0edee903786bf710b194767f944f2bad6f5054a8553e1a8d5bbaffc8958555c386bd2fd0d7b7bd496b36a998eaec6c3d641255b907ff1d9722b44d94d19975f1085d73379cc4985aa5cfbfc4cb89abe9664815fe76f0de0f33e1210c6f80d3df081b1da7661a21ee3b6d758b2be54844cf6e6530ffc5d49638212f8e5e5d91ef9c78e16e215fcc31b2728bb0cd9acbec30f16a85fa552975f919e10fd7c7de5a02b19a539f77907c9de1f7dd5f6917ef972b9e22acbc5e65378d6bd47a17850a2aba569a55fb2cbc929c1f1ba59079b8cc31f6a7cb330006b0928bbb84dd6423f59b7efd656fb08dac7acd06f0e514d0a1725a996f9d32ad888046cfca2704429adc5191f39fa9d647d227fddd744327c7b182df8b5253bd003a5d4f74e15f4e57aa2da5ecb601ff5497194baa65fdc37060d9012e4d7496daa544b2a0af2955756bb011c8aa6a767241399121de7764c0ff414d8c828afa6fc9b503e6cf48a453084a2776e5aa2205da1817c6ab65e375e835582a4d5c8d2c762b789472c6f4375adc6ed7a8efd4386048e14cbf3cb1eac6d27bebb7f504d832c1340acfc5cc6e403348381843ee947248cef00a0fb94939d9cbb0ef5d65bf5e50344819b3e2a616df8aaeb7cea18518fe16f698de8027a2361a8eb55b2836ce9c080c04560995c3fe765f1aaa7a8a5e17837ec37e2537039099e8650cd757771b1f7443cfaa1312749e5d529977780d81031ff0f37c861f50a9aa4e878b80fdbe0c35b0088b3750c1b0c4bc54e16183fe7c5a05c9ac4e1ce33d1b69acfe4982508a6ff8ede4732792a08a9636e7fe213d2c3488da9e22d772cdf2f71f1a6c3bf8020161688542a903b9b983933c8ee5494953117db7f4a7b1a066907205dd05a2ad9c1c6feca0a5b80c10e896c7c3d50e156500b02b078d14e46df53f118886f41a7bc1b0450f5efe6f3f84129ad398f78cbeb6b92b14833faa38162877d0b57fb84fc4ea18d466e040e6d2de98d234e97c19905d82510b47de50834d06c2b4a65d7487877bf90811577a5ae60d9bc17e69a2d8f086faff48f8cc8890a4936c6def4b5c1e80d6d257301078e1aab94e547b888b3267d6b234205abcb7d005e3e2fc1ba4fb1d37ddbaa6a5d70b1928a019649caf69d5bc2ef78de3c4c20573ec3f8359be29be47cc1948adccf658781789406f83c98e56cdc0013ebd44be6745f0085438ca757a7469656c9cce66ec9339d67745883036c4888e0c0c419377ec35bd2bb260d562214d9d576890c79cf6504d1299dfdf4c79a6e75a847f716d0888afc58e562696b89edd8fd86cb253c11716f8f226714551ab8af2ca7e8163899cde5c065a0d345faab58fe3392d51e8cd4564b4a75f0009be0b8e425f0b0ffdad7deedf8595dd2d7a1f87405786670b95f21cb0397241cb83fd0f6f5fbf405df6893967a45ec72e4780100f772517dc3b5ef95b1567bab09e08206ddea10809839c943b6ed87db63ce3d8285d3ce903fad894f92523c06df7485b000041e8c4a82568f3b8fe98bba456a88d3e4d638b70bd46d7e360c1d76502adb9a44ecf9436fd833f2ddca0cb6b1e53d735bccbe94910f948b45195cb1d14b4f4284f64aa9f6e877fd0c080f8754d4a60eea21775688fc3f45eaef1455f69070366d949ed80bf45ff7d5306df1a317e906c7d92ab35bc38a02d78fe088691d4aef2d8ed4bc418786077691a480a640e86060d67add3efefdabe4eb4e5ff114502e81633f3956961d3a04805b915cff4250a23e01e13127e9f0a8d22f111e714c651e00c5c2510b4cdf649d03f3bc3812109335738e9b43ff393b9e106d88097398748da96958a23e473eacd9bf184dbff06b0d5f2869c2df2bebfe4c5958d66252f20f18f616e601c741e2cd2c571a3420d9c03662e4afe587ab2fde0b370df3931d2bad17abb1a6558ba321907767b8e645d9c230fbf89b6a7048ed5ebc6da0ba83aa0ade664b5f465ec2e4f72c2ebbf0e50ef7d0e3c1ef0558dee778658110d65628f56f8c14eecb2a57a0a8d0c36fe5cdff1d22df0430f8dd420c7e059eec24ed4c383b38af40215a8ed676ef32da315df6c27213b5e0090ae2ea3d716714f1a7dfa9c6bfea250af206f02835779d5c9850c8340a80341b3edc1aca06f547496772b69ced9a1d5c5a145c1cea0c08078a5a224721e03db3e3b9a7cca2d8e00a36dbcf41646ba9900c8188cbc6863d067d830a8dbfa3fca4473f38ca77fc63a0a16ae8270747cb3879bed5ee41ccdbeab962b87827d1f9a8fb6eab0cfd4e103024ef9faef68b2a3b741e14561c480565e48aff5307416"}, {0x70, 0x100, 0x3, "2f6c671fc0a4fbf78e24bacbb9c3ee3748923e9a867b5dda1725592597cec3ec01f61597a3762fd6efee4893ce2ee6505ac9edff143f99324d747de00d3bc6da4c2c7327cfb12f71ec2e9f8ce53431237f19bd0c94acd2a954"}, {0x20, 0x19d, 0x7, "a7a3f021775ff232f3622c2ef201fea0"}], 0x10d0, 0x4000}, 0x800) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b40)={r2, 0x28, &(0x7f0000000b00)}, 0x10) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) mount(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='sysfs\x00', 0x0, &(0x7f0000000cc0)="56f782565e3b12bfc15918f9be5dcb36592e4631a74f65e4305f8bd8e4961dbeb45f") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000a80)={0x4, 0x479a9bb2, 0x5, 0x4000000000000, 0x18, r4, 0x30000000000000}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r6}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000bc0)={&(0x7f0000000b80)='./file0\x00', r5}, 0x10) 2018/03/31 09:45:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)=[{0x18, 0x1, 0x1, "13"}], 0x18}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) close(r2) sendmsg(r1, &(0x7f0000000700)={&(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="cd2e4be6baeaa8f4959925c8526a0a9b586853902f5ae8ba894ae095c8ed21ecda73de9f0cf6ee1955f46f9dcb2c00d71fb7c18c6bfe1003f16476b3cb45f6cf2523aec1f6f798f9f03a0f5f5af3e4b0f39d618b20e8c83798bdaef720e427ee79779fffe5369e7530944cf9870a0f952296566b8956313a90e3aa6251ee2b8aa753c26a6d187f474a0f635d1d90c3441280f716d694523a827899bc197144fe17132ba03a3438804e0d8c502c4b984070e81e2f43b518b1741b1294fb0a05e053bd9f1ce8324919e8bde279803919939dc2fdc3ecd3cb15d9acf96141e88bb571a7bbeee2dbbf09a51fb8e1", 0xec}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="b0000000000000000600000003000000b2ff39bb0f5d4f5f323a657bd1b1da5e28301aaf09edceb2428472f86651e5018159c324b729645b7bbcb12855c92cf9275b87998ae82a28fd2b86ff514a1dbe4fd9d89ef79133ccf32e872619a684854b75fc673f0c5edc8e6b2904f97f81e3ab32d1edcd253747b2cc96266f8b320e54f4faa0a7faf1cbcf769837b7f0577d19279db97f5cbab9b552f2edfaf6778e9469f6c48205a91021b500000000000048000000000000000f010000ff010000bd35dd506eaf0e4b42920092c159dbf03e17d1c87e93272e2ef7dda2f647f1ce9de98009d3dfce33304817d9f38739ee0db33a8c2691dae6d0000000000000000f0100000400000049de7ca011f4e74e86c4489f0775ab431e80cea0df051c000000000000000088d3c45490c8982d0d3bec5caae79f38e6ae6e2ad08ecae3bdfd5f78711d28e57352331637b4945da217cc7ea02ee4cac08132d6e0fce340e860ba60644fbffa2b0a926cd830b8eb07bd93e858ef9839acb4796dda09355450ab2c54aa0ecd5f5017dc7be9c6c0ad7135bf80d0b3951d0df41de09c53e05e3ec5eb570cd41fead64b6399812c78521c475e7513d846cfd4c90ed87393e2f4ca19000000000000006000000000000000880000003f000000fed58dc00c0954e10417c3a4509ee3cb1e1a92db2699dd97a9a42b6a8b5d84389d20b0095b8c41e807b1cb3a17abf7c1345f4c95ac49759274af6f66d8da628bca8809ffd264cf59bf00000000000000"], 0x228}, 0x8001) socketpair(0x1, 0x2, 0x71e8, &(0x7f0000000280)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) 2018/03/31 09:45:40 executing program 0 (fault-call:18 fault-nth:33): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:40 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847") 2018/03/31 09:45:40 executing program 2: r0 = socket$kcm(0x29, 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000001bc0)={&(0x7f0000001780)=@nl=@unspec, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/39, 0x27}, {&(0x7f0000001840)=""/109, 0x6d}, {&(0x7f00000018c0)=""/118, 0x76}, {&(0x7f0000001940)=""/88, 0x58}, {&(0x7f00000019c0)=""/118, 0x76}, {&(0x7f0000001a40)=""/53, 0x35}], 0x6, &(0x7f0000001b00)=""/153, 0x99}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYRES16=r0], &(0x7f0000000080)='s{zkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206, 0xfffffffffffffffe}, 0xfffffffc) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000001500)="1fb9a35449d9f8dda81a3ac745ce6f9a65b22b7cda108d6ed10e8c0880499a4b69a637cdd3c38787d578cf9a6dd98ee1bf56e511746f053d1258a41bac92fd9e9a60f7d9a6529572464ee5bab69620ffc4c9782d944cdf7e619e85c620b9fd14b572c88f82c345e63cc7ce0b4c2fd718baccadb11022fc058daf7362e291c28ba433a85c9a9a8c51beab5f9c08d78ecab1aae63deff39fc90a2b7f003377691902413cd91a345564d086fda4273b15d16acc686901e4e18195f40f281f0aa6a4f99d3e259ff0651dd8f8affb862995235a", 0xd1}, {&(0x7f0000001600)="7263dbedbe0aff138eb02e80e20150a1bdd0ea20dfe088b4c99639a83a854abba8f2aa83500704cfaf1c7b85b0e0bc30ef0141c091d3b5b559ce8434ce22c12fba6fdc13df3053db5ceb0c56f1ae73399a7d4c2ac4d8e2f91de97c126ccb17e40e3bdcf3aedf05fd20f37b1f6a583c2bfccf001b999bcfb44b0e38ff7a11d9e2350f19d8bb8955dd11fe0c2fd54183929f771a160154f45ab7196585bec2843b2df5009d7ba2de4ead887293a54a893b876afb574063977b98c53cc2", 0xbc}], 0x2, &(0x7f0000003c40)=[{0x1010, 0x109, 0x100000000, "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"}, {0x1010, 0x0, 0x400, "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"}], 0x2020}, 0x20004004) socketpair(0x18f8dbfc425feb5c, 0x80a, 0x80, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f00000002c0)={&(0x7f00000003c0)=@sco, 0x80, &(0x7f0000000140)=[{&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x241}, 0x2040) 2018/03/31 09:45:40 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x0, 0xb6, &(0x7f0000000140), &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:40 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={0x0, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:40 executing program 2: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x6, 0x4, 0x84}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000bd2ff0)={r1, 0x446, &(0x7f0000ff8000)}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) 2018/03/31 09:45:41 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', 0x0, 0x8}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xf, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='GPL\x00', 0x200, 0xffffffffffffffcd, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:41 executing program 4: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004a80)={&(0x7f0000004980)=@hci, 0xc, &(0x7f0000004a00), 0x0, &(0x7f0000004a40)=""/57, 0x39}, 0x0) recvmsg(r1, &(0x7f0000001740)={&(0x7f0000000100)=@alg, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000180)=""/4, 0x4}, {&(0x7f0000001680)=""/190, 0xbe}], 0x2, 0x0, 0x0, 0x4}, 0x122) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000040)=@generic={0x2, "714d50200da14566473bd12d025c4ffd36c2c98a4c2ac620f45ae7c633bbe4276c91f9c9f4c1ac3f8dec2fa9488668f844d0349bf2c741680f9efe5a378d4269a1ef13275ab351b532a9a10fbd12bc5f1275e3e22dc128e86b1b98c56a4471db89cd75fdf93088aeb890e426e89bd3b3f165e9c32042efb4470b33193924"}, 0x80, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x40}, 0x0) sendmsg(r1, &(0x7f0000004880)={&(0x7f0000000380)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x1, 0x3, {0xa, 0x4e20, 0x7, @loopback={0x0, 0x1}}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)="3afcc5ef6949c35f31bf50abab99524b1b91955f0c0291c5bff919f70ed1fc49eb6149fd816ef41a9cb442ba02a29b392fa4694e74b144cb5e274e300ea222abb9d6e3f51ce55dd57060cae270966f3881e5a2bbfd486d3e2810600490c6a03c5c5dbd22abd53652630d578a8141dc49840324208b636450d0aa069745ea4ac9fc655013cfc4fb8500b427c1337ce7695dd74bf57afbe45bed03afd0435e358da1c7a69c99c7fb82cc97e3c4c1fb5036fd", 0xb1}], 0x1, &(0x7f0000001780)=ANY=[], 0x0, 0x4044}, 0x0) recvmsg(r0, &(0x7f0000000940)={&(0x7f0000000200)=@hci, 0x80, &(0x7f0000000740)=[{&(0x7f0000000280)=""/73, 0x49}, {&(0x7f0000000340)=""/28, 0x1c}, {&(0x7f0000000840)=""/205, 0xcd}], 0x3, 0x0, 0x0, 0x8}, 0x10040) recvmsg(r0, &(0x7f0000000800)={&(0x7f0000000500)=@ax25, 0x80, &(0x7f0000000700)=[{&(0x7f0000000580)=""/180, 0xb4}, {&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000002980)=""/4096, 0x1000}, {&(0x7f0000005ac0)=""/4096, 0x1000}], 0x4, &(0x7f0000000780)=""/74, 0x4a}, 0x40000100) 2018/03/31 09:45:41 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847") 2018/03/31 09:45:41 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 281.928178] FAULT_INJECTION: forcing a failure. [ 281.928178] name failslab, interval 1, probability 0, space 0, times 0 [ 281.939511] CPU: 0 PID: 21653 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 281.946784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.956136] Call Trace: [ 281.958732] dump_stack+0x194/0x24d [ 281.962354] ? arch_local_irq_restore+0x53/0x53 [ 281.967013] should_fail+0x8c0/0xa40 [ 281.970713] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.975797] ? save_stack+0x43/0xd0 [ 281.979402] ? kasan_kmalloc+0xad/0xe0 [ 281.983271] ? __kmalloc+0x162/0x760 [ 281.986967] ? __list_lru_init+0xcf/0x750 [ 281.991102] ? find_held_lock+0x35/0x1d0 [ 281.995142] ? __lock_is_held+0xb6/0x140 [ 281.999186] ? check_same_owner+0x320/0x320 [ 282.003487] ? rcu_note_context_switch+0x710/0x710 [ 282.008397] should_failslab+0xec/0x120 [ 282.012348] kmem_cache_alloc_node_trace+0x5a/0x760 [ 282.017340] ? mark_held_locks+0xaf/0x100 [ 282.021465] ? __raw_spin_lock_init+0x1c/0x100 [ 282.026036] __kmalloc_node+0x33/0x70 [ 282.029820] kvmalloc_node+0x99/0xd0 [ 282.033512] __list_lru_init+0x5d5/0x750 [ 282.037552] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 282.043415] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 282.048411] ? lockdep_init_map+0x9/0x10 [ 282.052451] sget_userns+0x6b1/0xe40 [ 282.056149] ? set_anon_super+0x20/0x20 [ 282.060115] ? put_filp+0x90/0x90 [ 282.063553] ? destroy_unused_super.part.6+0xd0/0xd0 [ 282.068631] ? alloc_vfsmnt+0x762/0x9c0 [ 282.072581] ? path_lookupat+0x238/0xba0 [ 282.076622] ? mnt_free_id.isra.21+0x50/0x50 [ 282.081028] ? trace_hardirqs_off+0x10/0x10 [ 282.085344] ? putname+0xee/0x130 [ 282.088775] ? cap_capable+0x1b5/0x230 [ 282.092636] ? security_capable+0x8e/0xc0 [ 282.096759] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 282.101924] ? ns_capable_common+0xcf/0x160 [ 282.106220] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 282.111381] mount_ns+0x6d/0x190 [ 282.114731] rpc_mount+0x9e/0xd0 [ 282.118082] mount_fs+0x66/0x2d0 [ 282.121432] vfs_kern_mount.part.26+0xc6/0x4a0 [ 282.125997] ? may_umount+0xa0/0xa0 [ 282.129605] ? _raw_read_unlock+0x22/0x30 [ 282.133727] ? __get_fs_type+0x8a/0xc0 [ 282.137594] do_mount+0xea4/0x2bb0 [ 282.141109] ? __might_fault+0x110/0x1d0 [ 282.145146] ? copy_mount_string+0x40/0x40 [ 282.149359] ? check_same_owner+0x320/0x320 [ 282.153658] ? __check_object_size+0x8b/0x530 [ 282.158128] ? __might_sleep+0x95/0x190 [ 282.162077] ? kasan_check_write+0x14/0x20 [ 282.166289] ? _copy_from_user+0x99/0x110 [ 282.170424] ? memdup_user+0x5e/0x90 [ 282.174114] ? copy_mount_options+0x1f7/0x2e0 [ 282.178588] SyS_mount+0xab/0x120 [ 282.182034] ? copy_mnt_ns+0xb30/0xb30 [ 282.185909] do_syscall_64+0x281/0x940 [ 282.189771] ? vmalloc_sync_all+0x30/0x30 [ 282.193897] ? _raw_spin_unlock_irq+0x27/0x70 [ 282.198371] ? finish_task_switch+0x1c1/0x7e0 [ 282.202858] ? syscall_return_slowpath+0x550/0x550 [ 282.207762] ? syscall_return_slowpath+0x2ac/0x550 [ 282.212679] ? prepare_exit_to_usermode+0x350/0x350 [ 282.217674] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 282.223022] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.227859] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.233029] RIP: 0033:0x454e79 [ 282.236199] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.243885] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 282.251127] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 282.258376] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 282.265632] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:45:41 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='overlay\x00', 0x20020, 0x0) getpid() bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000f00)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000001340)={&(0x7f0000000f40)=@ethernet={0x7, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000fc0)="ee138740aa8dfe46f8e21f9eb8f25198374a15e35ff6257350f5ea365a86e3ae2f5c455c9848b9c5f8fd079f39df458053588a1a9aad5c54fc27e909055eedbced96b9b773ea4f5920e91d5839219f08e697d2f844f71f973b10d088055d44e2a1cfaa89edcffc03ad671823159a67bb2fa5f1ec808d855688c92a38e95083e75867d6757b038b52c040d95e1fc7a47049a13795", 0x94}], 0x1, &(0x7f00000010c0)=[{0xc8, 0x11f, 0x0, "9911bbaf882dfb022fdcc28289ec247a1ba4a778abf3dba189b7bfa0e5a07d86953555b581ad35cce14e94b4add5eb1a098f763b2a18be80476492c58d12a29beb102973fb5bbc5127ce1307a7868e8656d09957b7316f17d735d1f21d0c6f147e81cdd4f5cd79b00f3b478a54039b35c4d928866b5b9f06795bc440dc656f9b1289517edcc05302509958f24e9d2a69c85d0e7425042228c864e0cfe1ba3fbf1e9cfe0d2755dc1b3731ffb888cf6238a11e55a4"}, {0x98, 0x10f, 0x0, "2788e2f4c6f3783e121f82ff4dac944486ec6a3230c18404c661d20acadbd25f72045851aead3ae2f997a0091028e350f6fb2f46bc4f41f8886b9cb94d1fcd23b85defa892b39153e4ecbb799b0f788a88ff0443565ce2528aa5af819d2cbdac69182459b82ea17cd5e333c8b551adf78163f54167e166f0606852c04182bdc45d"}, {0xf0, 0x0, 0x4, "1cd223bb5ec9ac21d016eb7d33b11a00066ad4b580875470ff2623bccaf78748438061931796133b99b0d3ec797101656aeb7a091504129cd251beffeeb9d3c1b5a71950ef1557e1d523bc9907975ea4738232a34ae2b012bc8dc3068d74aeffac96f2f70d9f31e52b1684f181ec951c347a1dbe76c0e1c8e2a318c74e467d4da7d458db683d65877f086817e963746ca565ae7c08daa11f3424f728bf8ba3ff40188a1e345c7a0db2b5a6abd423ecfff68ec6febe9d086ae67ea0dc385f50c18d3bc234b7a01bfd540e40cdc461dce94aff5b3ddf231375ce004604c3fa"}], 0x250, 0x1}, 0x8090) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) recvmsg$kcm(r3, &(0x7f0000000ec0)={&(0x7f0000000b40)=@pppoe={0x0, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000bc0)=""/209, 0xd1}, {&(0x7f0000000cc0)=""/46, 0x2e}, {&(0x7f0000000d00)=""/28, 0x1c}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000d40)=""/69, 0x45}, {&(0x7f0000000dc0)=""/183, 0xb7}, {&(0x7f0000000e80)=""/45, 0x2d}, {&(0x7f0000001380)=""/254, 0xfe}], 0x8, &(0x7f0000001500)=""/76, 0x4c, 0x9}, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:41 executing program 0 (fault-call:18 fault-nth:34): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) [ 282.272878] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 2018/03/31 09:45:41 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='ocfs2\x00', 0x20080, &(0x7f0000000b40)="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") [ 282.573623] FAULT_INJECTION: forcing a failure. [ 282.573623] name failslab, interval 1, probability 0, space 0, times 0 [ 282.584950] CPU: 1 PID: 21683 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 282.592222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.601570] Call Trace: [ 282.604164] dump_stack+0x194/0x24d [ 282.607798] ? arch_local_irq_restore+0x53/0x53 [ 282.612472] should_fail+0x8c0/0xa40 [ 282.616169] ? is_bpf_text_address+0xa4/0x120 [ 282.620645] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.625729] ? __kernel_text_address+0xd/0x40 [ 282.630209] ? unwind_get_return_address+0x61/0xa0 [ 282.635131] ? find_held_lock+0x35/0x1d0 [ 282.639179] ? __lock_is_held+0xb6/0x140 [ 282.643231] ? check_same_owner+0x320/0x320 [ 282.647538] ? rcu_note_context_switch+0x710/0x710 [ 282.652456] should_failslab+0xec/0x120 [ 282.656411] kmem_cache_alloc_trace+0x4b/0x740 [ 282.660971] ? __kmalloc_node+0x33/0x70 [ 282.664923] ? __kmalloc_node+0x33/0x70 [ 282.668878] ? rcu_read_lock_sched_held+0x108/0x120 [ 282.673879] __memcg_init_list_lru_node+0x169/0x270 [ 282.678880] ? list_lru_add+0x7c0/0x7c0 [ 282.682837] ? __kmalloc_node+0x47/0x70 [ 282.686797] __list_lru_init+0x544/0x750 [ 282.690846] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 282.696712] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 282.701717] ? lockdep_init_map+0x9/0x10 [ 282.705761] sget_userns+0x6b1/0xe40 [ 282.709455] ? set_anon_super+0x20/0x20 [ 282.713412] ? put_filp+0x90/0x90 [ 282.716848] ? destroy_unused_super.part.6+0xd0/0xd0 [ 282.721931] ? alloc_vfsmnt+0x762/0x9c0 [ 282.725885] ? path_lookupat+0x238/0xba0 [ 282.729926] ? mnt_free_id.isra.21+0x50/0x50 [ 282.734320] ? trace_hardirqs_off+0x10/0x10 [ 282.738625] ? putname+0xee/0x130 [ 282.742063] ? cap_capable+0x1b5/0x230 [ 282.745938] ? security_capable+0x8e/0xc0 [ 282.750073] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 282.755242] ? ns_capable_common+0xcf/0x160 [ 282.759545] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 282.764713] mount_ns+0x6d/0x190 [ 282.768066] rpc_mount+0x9e/0xd0 [ 282.771414] mount_fs+0x66/0x2d0 [ 282.774763] vfs_kern_mount.part.26+0xc6/0x4a0 [ 282.779327] ? may_umount+0xa0/0xa0 [ 282.782937] ? _raw_read_unlock+0x22/0x30 [ 282.787067] ? __get_fs_type+0x8a/0xc0 [ 282.790940] do_mount+0xea4/0x2bb0 [ 282.794458] ? __might_fault+0x110/0x1d0 [ 282.798504] ? copy_mount_string+0x40/0x40 [ 282.802721] ? __check_object_size+0x8b/0x530 [ 282.807201] ? __might_sleep+0x95/0x190 [ 282.811161] ? kasan_check_write+0x14/0x20 [ 282.815379] ? _copy_from_user+0x99/0x110 [ 282.819510] ? memdup_user+0x5e/0x90 [ 282.823201] ? copy_mount_options+0x1f7/0x2e0 [ 282.827679] SyS_mount+0xab/0x120 [ 282.831114] ? copy_mnt_ns+0xb30/0xb30 [ 282.834984] do_syscall_64+0x281/0x940 [ 282.838854] ? vmalloc_sync_all+0x30/0x30 [ 282.842979] ? _raw_spin_unlock_irq+0x27/0x70 [ 282.847457] ? finish_task_switch+0x1c1/0x7e0 [ 282.851932] ? syscall_return_slowpath+0x550/0x550 [ 282.856843] ? syscall_return_slowpath+0x2ac/0x550 [ 282.861753] ? prepare_exit_to_usermode+0x350/0x350 [ 282.866750] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 282.872098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.876924] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.882096] RIP: 0033:0x454e79 [ 282.885262] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.892950] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 282.900202] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 282.907453] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 282.914703] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/31 09:45:42 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x0, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa83a, 0x3f, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffff001, 0x0, 0x0, 0x0, 0x9d4, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x0, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, 0x0, 0x0, r1, 0x0) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000046c0)=""/4096, 0x1000}, {&(0x7f0000000780)=""/55, 0x37}, {&(0x7f00000007c0)=""/255, 0xff}, {&(0x7f00000008c0)=""/38, 0x26}, {&(0x7f0000000900)=""/144, 0x90}], 0x5, &(0x7f0000000a40)=""/63, 0x3f}, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000023c0)="56125a44390d7cbbdf2badd5dd2d5f172bb70a406049a6bd45e38faed5fa5eebd4db40dc83e1e469b14592f615f4cd1a683b4cfe6f5740278c2e9cb8759912681abb") mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x80000001, 0x0, 0x8, 0x0, 0x1, 0x100, 0x3, 0x10000, 0x3ff, 0x0, 0x10001, 0x100000000, 0x8, 0x5, 0x20, 0x7, 0x8, 0xffffffffffffff52, 0x8000, 0x5, 0xff, 0x1, 0x95, 0x7, 0x204, 0x4, 0x0, 0x8000, 0x5, 0x5, 0x400, 0xfffffffffffffff9, 0x6, 0x3ff, 0x8, 0x0, 0x5, 0x1, @perf_config_ext={0x7fffffff, 0x6}, 0x10204, 0x8, 0x3, 0x7, 0x6, 0x6, 0x183b128a}, r0, 0x3, r4, 0x2) r6 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r5}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) socketpair$inet(0x2, 0x6, 0x6, &(0x7f0000000640)) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000024c0)='./file1\x00', &(0x7f0000002500)='squashfs\x00', 0x1004, &(0x7f00000026c0)="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") socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) r7 = perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x41, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r6, 0x5, r4, 0x1) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r8}, 0x10) mkdir(&(0x7f0000000740)='./file1\x00', 0x4) r9 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r9, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f0000000700)) 2018/03/31 09:45:42 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:42 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847") 2018/03/31 09:45:42 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x0, 0xb6, &(0x7f0000000140), &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) [ 282.921959] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 2018/03/31 09:45:42 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={0xffffffff, 0x53, 0x10}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) r3 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r3, &(0x7f0000004080)={&(0x7f0000002a40)=@sco={0x1f, {0x4, 0x5, 0x7ff, 0x6, 0x1f, 0x4}}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002ac0)="e63e85eceabacfc8d876f4501e02a9af638031a98647592341399c5e83b1b92052f513687715aa2446009641883588d2b27fffad6f0757971887898ba86df36367ba15e384eddce2b97fbb6cb61d866f4fecc96ebbc977b701c088c477e352aed9558be0f1f690becd0f1b926c4c392d48912588e2e8445c97bf14967d56f0dc070e7b5a7864fcf6cb6408debb13d45984f297de1e33cac9d16bddcfaf5b769adf6b00669ad7a29ee783c8afa4069572d79a41974dd0ae645e29261ed5a15fd510c425641b43d764ebc33c240778706749570a822ebe4f75ed81856e7412b159e32c8e00e2cc17f93313bdb4860a59882ea28bf325b0f91966a7b1f38aa04d806fd2b2adc9ddff600e5ceba89db804c8cd2123f03546d7bafaf6290f46a0840fc7443061124e40a0e690bd9ca8da0d0dbeb585cec7994d659f2032bd66442e99d8e26f838ab4a258bcaf7587f3efec250ad01628adaab315c79953bedb738abdf17fc7597f6b22040c0fd928b61f97a5ab085919f87a3a7ad364d9f14255aa779fc8e1b9663b7c92c498e1b7ff6fb76abf9f32838fee4470183d4a97ea0bc4aff2a2c35bc4329ef85ee1da185bebddaf05336d8e651e3ea54125ca224c271dd865a0e0befe144ddc9954e6e7a13c3f490afe2e432fa623979ddd9b778f1a26044fae8344ca585beb94904618004eb5a06f514e9a54da61da7a5146477d9597522aa0cb00d4442eb29869dbe357659feb3ee38cc57840cacb57c9b6150f83fe602a1c0b293704dccb114d7dcfbf01454b4d57261514c650680fcc0d995f76d2c5f0b0facc77d2fec6f8ec016ccc94ed78d893d280349f8562b29d4690b8bb1ad2638fbd00e27c738c8cbcea71c18523ed3d22294ea0d98f643da86e5dda6f3fea9bbf71d02fa29e807a6aa66127cb275cf69f7551c1bdd394194d238a24f2d21f24d482b6716cd0fdf0d3aa00b4717a149bbc117e243ce99fb8e6a552fbae99b60590145f84f5dc0cb45cb8376e8555656a8b29c2a64370e59cadea643d911847578559a7a72c9deefca5bb568a6373aaf6e78da27895222c577160f57477e8950c6fb7e972f779485d4201eb4e13076fec6b3719d082a88cdbbe87b184b63ab0af6347a7084fa4b58e94eebe8d7fea47b8359f39e8877aca4d97bbf2e1705b2977dc5709e22bc0837bcc8193a3b9fe00677ca4207c71eb646daadf8c0c1a155d4b8a419c5d340094be9d45e348bd83e7f38680f246b9376e83b5cb30114694ea326d843c9de17975f5fb451738e77dfe9f208d38697d083ea1ac270da65664003e6622ff0563158f448ed5177a1017dcef3afc2f6125819897439286743e2e6c94631590ea4740f5af920f5c71935345bf5eaa0cdabe70b0718d4efb8c18fdf42e4b448ffe23d5347d7e64ead4f5fbd7e68909e995ec9cb52c463da6624f12654db94352d4178d800e318abce15126eec97afe1d07b19cba6e28654d126bec6d10cd29362d1e5f42e0c2a528edc4ff45afdea7774e2be74293290c7dd8b3843af63c79699243720e5b93b0bb409711ca7ac676ace343063bd5c214ff283b0b29a0337c7964aa2483ce498d37f1ac055340d74fbadc27ff585d75b25467471dad04ffafb8f7228549bb00848a325791e24159839802ed4989420294a58d0aad6daf99ec050a6843002aa219f4a193ce3d9411e6569f8bc5c72c8a1f8ed294e27b6cac3adfacd4b10d5481b4540b972c6b8ebdb1b66a79ab7e9e1eefe9ccb17dee04302ed9af783fea1a17ef75c6b475f394a39c054cd1b8ef82a10889dca61420ac69407a5565ea8c88d746f117dc63ae215e38678ebeb64566b483866a7a082b7eddda8213e4be5117265fd4d368d156f83990d0799e03fbefcb27e3ba050b57ca08854fa3eb1ae3e74f8097e04c5e7b2284def2feb570ca80bb892432292d1e3a32afe9a35d8c647ed7ad621230aaf894d74c4dfc0d37004256fa11ed2c5cb5b7887f580a81dc8dec4b3340d4528ed6e3a339973f71edd2e076f366fb8d8109be986266c4c371c555c496385f8c0b14ea54b96877f6cdb1aa0a2e250eb6f019c8d6ad438a9f1f8465726e684b567bd601ed9f8199e34335c21fb2c69ba0815ed912fa4f97e3eea07ae43528d149b01d0e92699857b7b7e097422495cb2bb5b35ab7a3a2696260fc7e57b88299f483045aa999a29fd6fd81cf1b5ebb304548f71137ee22afcfb466d77510f519bebfc88a29eab44083942fde6621ececd05dffa13dc98ef44fd2817a54b5fbd9b6ddf2e0d3f11a3b40a0462a25f5e2e6f2b1ab3465d6b3098c357efc0a776a765917f6993850b79b4017fa8ce324c0cefe9dbbc6be0d7a6b5b4f18c3e87ee7d5ed710b945f00cd83f1c36fb7f9c80cf4588d85125c0dccdbb2804866913233fe0d58fcd0354546a9cbfe478769c3bf736bb5ab4766cd1e139b7a9bfa374120d2140a31f118908a6a8af77cf917c6d5af690480d6b1a597a41e2cfe3647aae51d2d82c3b75dabfc3de06c31a30e89c2337fb760b7fb9874009ab7e183b036c6299a6849c5400d432d2f298d879ee58b167c6ff0b19588457751e45203836f69525db1d7b5c3ed599c5b4e5284c75fdca797adc4f8b802992d806eaf47cedbe8a162c4f1a33e431560ac3f552282dd92a2eed68a5b214e478025cc291e71170cbf4aa1d3096dcd6571c0d19c337f90e2e47f8595d373ba639b59912f21ecb7f828a05495f4578f87186f573ee4eacc39ede1443c1419aea3b89dd5abbe3890a95852d3af09f14e0c814b7c0104efb5655c2b2c922e801fe8a3352f7c1e35cbd5ef1e634a8394b4c92b4b9cbdf1f5492f4c2ec9c1ba70709a0b4718e4c82c589b273e3fe7240f49e50991f10d7429aea6729f37415b1ac370c0aea6c2f53a47e84f3e93a1b470630f6acd4b62ecb1d6457c1ab4311f738498e34db38efff50730e1925271dd51172229ba87a672b54a0a0ad4bb8aeab012843c8afcc836baef312657b5bc5662515a50e46105f16c64a71356161ea847e0ac78c0a9bdaddb05768725f23133f4c3ee1e7ea79c457c2c47520742b20af8907c352526a8114375aaa1a4470fbfbd28fbe62f89709542d8a4c8859ff6d3bee683d7ebf0d1929ae5a5efcbd325100634eae459e4ffd0b41b769c09fe0815e0a45898b7c9780b7c5a2cbe7321c5ca7f37ba29bb30bb5f43f69ad48dd92a08910e1f257b645fa570dc1f1dbe3a5d21ba3df38bcfb7cfdd91384cf3b4c4524431db249789d9589ea75dacb3cb9b0776a1606d3bbef62e2bb8f9ba5304e9db08828f77abe468469a2ed2a859874ba549b0fdef22dac9aca6c5cbb79ae513282283e8bb4056b8bdee1c9b67388d9773e796ad4f65a9bb9fd7c07d22b0ddb86cb7efd651f408c6e4b528328d417b9fdb5fb68a0edca24d305c93661cf2f616a4c7bc3a3b4002d0aa20b4e67ea503dff876f7512cd88377ab6f71201c424e6840c8c257557c54dfd13f712b79068c77433416d44630164013546f2c8793c6562e465e4db510b0830270e7c1dac13ddd0875e24515186953fdf89c5e3fab4409f53885e2d214baea51a8163b1e3a2823cd819818268e7dba484971a9ca0061fa4e77d05ef691617a76086e3a919fc764cd44923e5d70138bde48540cb9d7df5dca88958903a26b3a1563f78ee9d8b74e6c6fbc4cbbc247a15a3be35d1fd722480516b94a09373abf91d9fe60f2f6d9cc37386c68f14c32632de69cc20e076fcef38eab066dfe0b6cb1da1ea8cc61447e6cdd1bfe411f406ab3968b6dafa8f6adbf4fe44e6d5b8f304c2563c448af4567f4f5dede63f5c7a842606abff052618ec9a8897c8eb7d44bae665fa24674f70bbfa2191ca73add5ad13ea3183ed01cab1f8b15c34c07d9d4eeee59e6b3ad86f789220a4d6b33b84dc87f9c2f13e203f0e700055f7b3b3f1264406d4700e3f254c9b36080c9029d2b809481bb04a4da1ef68b681bf0127f4f4ce22e169996d3860b54acba425075604b2a23e4d69b9dcf79ade8ebd6143a8c975aa280ca2df8a42749bf50b2bed3269a585a926276b1e257fd7edc723626a747ca18027bdd11806ac054add6d8ee0a9d23114b54a7ba2c10681490ff7b268b02d4434976d9a2764494ee18422bf53a9869d3d9fcd04b1f86ee6c92aa25878604e16834c636f49bf66f4cd37148253bd712f01a5e2dc26e8a77de991fbaae84975ffbd2f77dead5765f55d9e2387374236ee38253242c63c2ae796b10af01c20ff970315aba70f80ad61524a0ee550931815576d9aac32abf465c458d6d04626d7c661bd517c1fb66df523237feb3eb81d5618a894e4c321c8b0ab6fc1ee26f6af1bffbc1911b1e530d60ae4b075392a4bc0fb5a95fec01cd6aa161cbf3d378d133ebfea61378a5455bf3fe034067378433b9e12b0f37edddad2c92646da924cfb19478cc8b997f63ef16a46aeff06ef0b973e302dcd85ff73a1e4a3f375364130b5da2ea1b0b8770a3a77101130604d356e0fd2055366cfeda1df2bbad650a9d8ff8bdb1b41eb78f433b2754f2c7e2c1e73f880be97ffab2b0ba560aac08b714d673e31037faf9a6f6e0cfe6521ddc6b342209d9674cdd632166c2d8eda4244e4117afe397a39940ddadba8a511ab4589b6720d951672f47ee25837f2f1fa12f94459d251f12b7209d24c03b541647c3d73c566e36a58aa4f05ce1e90b4a6151e078a8ff80590cd536a7b1f0da78b3ad0d0afdcbde3c3ba968d1acb624dc4180fea3c3622f577624d8b70d9484409bf76e63fee0a90460a64bbb6f3a4252cc78f27bb9c51e6300a13e2df595029829b9506c981da7a9900bcc0a07b7ea3f3d511fd00d79d563e3b4a4f5609ab4979e8e36f0343e87eb8535598f7d863b9f9d5f75d6ab2b19fa5eb5be2ad0b18ed4ff63f7215a34639675b50d1fad5d7b990facd9eaba651d69e9ba065e902ef8b7a5da2621c78bca640b62ba87df4b0cdd20b1af7d98e37bde91715239a9edcd273c8d221a14802eb62a88ac7057e012d71e96c1d02e57ceed5e9f94c297cca56bf6b41fafa3cbe78d9d2ffe37447aead9aea6bfa934d4580b1beaf9c93e1a5c806dd03462cbcd2be31cba4ea1b861f19c88ad1e3f65b73bd74711be8c719a0b2d0dc2d6747d6d265a16bc811e457a99e7ad185d893815a1a56a40f97df26ded2ed3a2d97c040812517f8cabf42a137771021b784b2e2939c5fd9e6b7a560e0a7ce3fa60d57a6c66d7304e5505c0536e2c68d27a349647b62d31e1295792bded7224d1185702bb6307d70be1508e3e5ab3a3b1f770eee5cee2f965ccb28a9d4eea8ac820bdec973e7c6123d8519dc7825dcab138c90ce39752d4af092c88f35111b07692ad9dee19e7dd6b8f44f45753d8c5cc86dfccc89ee6456dc3d4c54aa7f49906d549dc18d6c89f0e59eacd43d45c7fcd2703c0dbc6e133930fce1d9698c644e2c8c9829b21356e3c51bba22cbe80ceafe8e3456270c524fa67082b097ba6f423143f19b61f6b1f3637420ca0b9ad5ca10873999c80dd7bb4e142599991e0aa8555b4f86ebb2c495b9cda67feb84f7fb41a827b84611e26b6335ce5048c2b1f102576170c66756e656f18317bea4bfde19d2338aac4dcfc0905639a45930a24d6357915404b16d37d9c9891d50fbaea164cd11d211e64a81539d7e690d6846cf41d908e958f5eeec66fd36974dc8b3ba9992d36c2fa2231061838ec525e21ec01a16c0793cf1c882d3e87b2c393ef70264d3dd8b6e8789d9b9560f6822b533cbdeee0142f5e149c52", 0x1000}, {&(0x7f0000003ac0)="3140e4b7a073f090aff982c082a56de919c5fb7a37a6efef8f8b3fd244ee1bef192a73b877f35f61acfe79b2a7c076faa97054fb0ef0cafc6474199a4dd06abfe83de0993cb6f44396e7a37d0bb4f9ce0eb20cb0617c51ab3f81291d0c7aec25bc43733f876a2f89895179d6174225da", 0x70}, {&(0x7f0000003b40)="7e261fb317e54fa7687ed87457ecbdd6a014d83d508b2e52e4ad862df2e1b23ca9f80ed3551a915e04da997d274ade332c412282606d8eb7e6b656cdfb8f067f03e35cc49350d92f729ef0530a63eb5d02d9a0e53f4bbac75b8cfc5a41c6e273f0c0859c7f139a9d9a2b70870bd98b5a7fc7f3663638b4bdc101fdb185d145a036b7c0897d50f83cbdc0837fec249e5135cf04342eddc6e21258796804170e7f2b6e80c130dd27ee76e4e45af60ab09b23c52b6f70fbd326dd14814d1ba3e26b3b232f", 0xc3}, {&(0x7f0000003c40)="fd4fc5e6561d36056a52fc4819c894d096c4025a5e0811a4300a90317a9f1200d05b6daf438c649ec611e30e8b7e8980118605625db11c480abb5509b7225033b225aa87e81369fec706b3434dd608975d48bf6d8c78407d82f5387d9538ed7c69414dbe03e4be6fff826ce9069a1646efb6113c7f8f7abf80e46f14d6c6783759dc4ae43012f2a7628dbece829876460fd53b4e995424afef67778921eac55b", 0xa0}, {&(0x7f0000003d00)="213cc9f26c727241cdbfeda123c0b7bd5e79963476eaa61e1f64a39e28df4b7900d4957e994917a6545a21ce0d5a9b7117a065d6bc56d2b575d5a2c321c4bc725541011ee93c6e8bea0b661819ee66a02110a7eafd93e35c", 0x58}], 0x5, &(0x7f0000003e00)=[{0xe0, 0x103, 0x3, "67755aac497d4779b4383d84f2b396fbed7e5084d7b674e4c52217f6b19582d670ee47d2ed90a2b0c9dd2d31e8f94eb88c0d5d46326d790f9cc6d7a64ccc0b62342e0d81aa81b1dfb09f5d2ea98964a7375aaf523da004fbd1615aba5ce30065c0d6d2b94b2c301350e5cbc9b7dd8c7eb18e1c4a82ebc28570e02f49f97c9f7cc357af9b40f501c1aa5620fb7337cd9c260ce5ee36af5c95b73dba270dac106dc6088b615f3a5089a93ccec3f6e54d24aeeac5cec1f73e5215c13912145bc0c8d94b608726ff966e025fb62b627a"}, {0xe0, 0x0, 0x80, "e4b591b9e0204230b84f7587036d7f84cde23e5b5fb01fe27cab9003972c88033a4d812ef5d71f3ddbd7b076fd068f3550a44016c7911a6f9e2d1b35c7cd40b572f8c103ded8354c234d54b806933bc7d87b915fb6ad90569b5dc8931d6dc99e3fc2118cdf04ff54afd289b5a2694c357ada59f46770edce70523d8a4a7f01a596f57a65aff4b6a4807477e60e36c9fe2bc063cc01130af5f15072cb4cfd8c800028572d56a39e61c01a9bd403fd498bd23de06542865ad1cd0fd1eb74a7276c313e346471fed4506959"}, {0xa0, 0x118, 0x1, "2e06a6439dc44edca492d76740b38166e5cf9197f05fe507e6f4635141c88dd4dba538ed2227ff5e5872b8e78fc91e0adcb60e652dd02d2b723370187d0ab569d088b9b9d9393be25ac5a0c097d4aacdd1f1eca26a4cb3c34ee9e67dd081f7189bf63ea27f75d855487f8f0ae622da60df386fcabffc2990623f5756d8cf7e5ab18dab22c511767dc20690"}], 0x260, 0x81}, 0x11) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000280)=@can, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000000200)=""/93, 0x5d, 0x3}, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000000c0)=0x5, 0x4) close(r3) socketpair(0xa, 0x6, 0x1f, &(0x7f0000000340)) 2018/03/31 09:45:42 executing program 0 (fault-call:18 fault-nth:35): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:42 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xc) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:42 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714") 2018/03/31 09:45:42 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 283.138696] FAULT_INJECTION: forcing a failure. [ 283.138696] name failslab, interval 1, probability 0, space 0, times 0 [ 283.150057] CPU: 0 PID: 21707 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 283.157334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.166689] Call Trace: [ 283.169276] dump_stack+0x194/0x24d [ 283.172928] ? arch_local_irq_restore+0x53/0x53 [ 283.177601] ? __save_stack_trace+0x7e/0xd0 [ 283.181936] should_fail+0x8c0/0xa40 [ 283.185642] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.190732] ? kasan_kmalloc+0xad/0xe0 [ 283.194605] ? kmem_cache_alloc_trace+0x136/0x740 [ 283.199437] ? __memcg_init_list_lru_node+0x169/0x270 [ 283.204613] ? __list_lru_init+0x544/0x750 [ 283.208831] ? sget_userns+0x6b1/0xe40 [ 283.212711] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 283.217448] ? do_mount+0xea4/0x2bb0 [ 283.221144] ? SyS_mount+0xab/0x120 [ 283.224751] ? do_syscall_64+0x281/0x940 [ 283.228790] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.234135] ? find_held_lock+0x35/0x1d0 [ 283.238178] ? __lock_is_held+0xb6/0x140 [ 283.242229] ? check_same_owner+0x320/0x320 [ 283.246539] ? rcu_note_context_switch+0x710/0x710 [ 283.251466] should_failslab+0xec/0x120 [ 283.255426] kmem_cache_alloc_trace+0x4b/0x740 [ 283.259990] ? __kmalloc_node+0x33/0x70 [ 283.263943] ? __kmalloc_node+0x33/0x70 [ 283.267899] ? rcu_read_lock_sched_held+0x108/0x120 [ 283.272901] __memcg_init_list_lru_node+0x169/0x270 [ 283.277902] ? list_lru_add+0x7c0/0x7c0 [ 283.281860] ? __kmalloc_node+0x47/0x70 [ 283.285822] __list_lru_init+0x544/0x750 [ 283.289870] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 283.295734] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 283.300734] ? lockdep_init_map+0x9/0x10 [ 283.304782] sget_userns+0x6b1/0xe40 [ 283.308469] ? set_anon_super+0x20/0x20 [ 283.312419] ? put_filp+0x90/0x90 [ 283.315854] ? destroy_unused_super.part.6+0xd0/0xd0 [ 283.320949] ? alloc_vfsmnt+0x762/0x9c0 [ 283.324910] ? path_lookupat+0x238/0xba0 [ 283.328956] ? mnt_free_id.isra.21+0x50/0x50 [ 283.333362] ? trace_hardirqs_off+0x10/0x10 [ 283.337678] ? putname+0xee/0x130 [ 283.341127] ? cap_capable+0x1b5/0x230 [ 283.345000] ? security_capable+0x8e/0xc0 [ 283.349134] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 283.354308] ? ns_capable_common+0xcf/0x160 [ 283.358618] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 283.363789] mount_ns+0x6d/0x190 [ 283.367132] rpc_mount+0x9e/0xd0 [ 283.370475] mount_fs+0x66/0x2d0 [ 283.373830] vfs_kern_mount.part.26+0xc6/0x4a0 [ 283.378404] ? may_umount+0xa0/0xa0 [ 283.382020] ? _raw_read_unlock+0x22/0x30 [ 283.386159] ? __get_fs_type+0x8a/0xc0 [ 283.390035] do_mount+0xea4/0x2bb0 [ 283.393557] ? __might_fault+0x110/0x1d0 [ 283.397600] ? copy_mount_string+0x40/0x40 [ 283.401821] ? check_same_owner+0x320/0x320 [ 283.406123] ? __check_object_size+0x8b/0x530 [ 283.410596] ? __might_sleep+0x95/0x190 [ 283.414550] ? kasan_check_write+0x14/0x20 [ 283.418763] ? _copy_from_user+0x99/0x110 [ 283.422895] ? memdup_user+0x5e/0x90 [ 283.426591] ? copy_mount_options+0x1f7/0x2e0 [ 283.431070] SyS_mount+0xab/0x120 [ 283.434501] ? copy_mnt_ns+0xb30/0xb30 [ 283.438367] do_syscall_64+0x281/0x940 [ 283.442232] ? vmalloc_sync_all+0x30/0x30 [ 283.446363] ? _raw_spin_unlock_irq+0x27/0x70 [ 283.450836] ? finish_task_switch+0x1c1/0x7e0 [ 283.455308] ? syscall_return_slowpath+0x550/0x550 [ 283.460220] ? syscall_return_slowpath+0x2ac/0x550 [ 283.465134] ? prepare_exit_to_usermode+0x350/0x350 [ 283.470144] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 283.475496] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.480333] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.485509] RIP: 0033:0x454e79 [ 283.488680] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.496364] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 283.503627] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 283.510904] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 283.518162] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 283.525422] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000023 2018/03/31 09:45:43 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', 0x0, 0xce88c758ddc93653}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000a80)={0xf, 0xffff, 0x7fffffff, 0x9, 0xf, r3, 0x4}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:43 executing program 3: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r0, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:43 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001fc0)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000024c0)={&(0x7f0000002040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001f40)=[{&(0x7f00000020c0)="73c7575b94a72990e177f86ed4835a72a65c1a6c6831eeb0c48163a47ab63bcb605c8450cc4798ff6521c2aa722d1a7105c8a07e6c", 0x35}], 0x1, &(0x7f0000002500)=ANY=[], 0x0, 0x40000}, 0x20000000) r2 = gettid() r3 = perf_event_open(&(0x7f0000001ac0)={0x1, 0x70, 0xffffffff, 0x835, 0x9, 0xffffffffffffff5f, 0x0, 0x1000, 0x42000, 0x3, 0x8, 0x80, 0x1, 0x4, 0x100000001, 0x9, 0xff, 0x8, 0x1000, 0x7, 0x7f, 0x200, 0xb715, 0x3, 0x7fffffff, 0xf0a, 0x40, 0x8000, 0x8, 0x7, 0xffffffffffffff74, 0x4, 0x6, 0x100, 0x7, 0x335, 0x3ff, 0x58, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000001a80), 0xe}, 0x244, 0x80000000, 0x82, 0x7, 0x5, 0x3, 0x80000001}, r2, 0xd, r0, 0x8) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='mqueue\x00', 0x0, &(0x7f0000000240)="c5bdea9b496391f52deac807dd7df46031af762f74c804ff9be6610ef03a40b76e2b31347f50d272559c1f5d8738f3b2f28afe97f3e743dc178404f8f06f6aa31c13fa8a730ea9ac9c0200e87aa393a4274f4412787475fb77c5e4d5d04fecf1ff0a5589f11f11f3") getpid() r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000002380)) mount(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='./file0\x00', &(0x7f0000001c80)='devpts\x00', 0x40, &(0x7f0000001cc0)="be623dfd58807ac0b2f86f052863a5f30adc0bce173ebcf648cefd7d64732aeb5b94e6af3ab33e53669ba6d304d067dad4b1ff3ed87f18fd170aac904e8f105e80e22881717c98752a9cd7cfb06d102877e3b36b2624d22427331755a9514b225d25999ed605ffe4188630db2e7ddcc57f6316b60c4f3845d9dfcbbde5e49af627b48d7c9bd743b536de31a9ba3010cb6714c9b90a50537be55ca12a18e6541bff5a82d293e7734ea9c90707899663bd96b3bcce5887bf0bd35963c5adc39ddcb6f2a0a02b01661242046cb54ef1aec5a486b69e006305064124867bf79f4dc11798e214b61575168b79887122e0a3461f703c077f902c0a") socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000200)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000480)='afs\x00', 0x40000, &(0x7f0000000500)="84e54df160e952f9a630bd304886de601daedac5704258862ce9e7427a4e1e9cfa873dffafada8367ceb1664967178cc57677ae704d2812cb8c1404fa7155d60abfdea58a00f14f6e3468a5e06ffd9d7a6277c29c7247316c20d68dbadbb5911b505c986f60499bf532c75316e14c7d2516706a67f1ba844d0e5200e3b0002626c1690cfb141af0e07ab6f02d34529fa89e74ce8d157681e2c3491bc1dd572d6a1") ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000002340)=0xf60) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003900)={&(0x7f0000003400)=@can={0x0, 0x0}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003480)=""/194, 0xc2}, {&(0x7f0000003580)=""/250, 0xfa}, {&(0x7f0000003680)=""/100, 0x64}, {&(0x7f0000003700)=""/14, 0xe}, {&(0x7f0000003740)=""/159, 0x9f}, {&(0x7f0000003800)=""/15, 0xf}], 0x6, &(0x7f00000038c0)=""/29, 0x1d, 0x5}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000003940)={0x4, 0x9, &(0x7f0000001840)=ANY=[@ANYBLOB="18000000030000000000000003000000dfd00c00fcffffff0000000000000000000803000101000000000000000000003d01f0fff0ffffff000000000000000095000000000017d2"], &(0x7f0000000380)='GPL\x00', 0xf172, 0x4b, &(0x7f00000018c0)=""/75, 0x41f00, 0x1, [], r5}, 0x48) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001f00)={0xffffffffffffffff, 0x0, 0xf6, 0x22, &(0x7f0000001dc0)="9ef9482ea02fd36d0a768986a7ebe7a627dc88937e7073e3521858dfa0d5e02f571a01cfdfa76e048e5f956ea5da60b90e02a6c3d3687ed61ec9ab5b682c02498bddef38de9ce8c753e41e78f414d16202a033b6c7752711a5f56924e7846d6dcde2f71026e1eb0319b5e60f6b1ec67fca31c3cf1691d3af91a19f56be5a10ff337a53ba13dd3d75e1555211954b92ec0082d02b7b4cdddc021cbe84e4af8f20788977e3416918843e6c92b2ebf7b8b33ecbd4c7c9a9d5036c3e3e538748a32f1a28eb77818ca1878ffdd445dcdb8a40e6221e0fc474428449dfe93c62bbc69996aa9b34488c1da4f6f7c2275305a6a4fb256c1a516d", &(0x7f0000001ec0)=""/34, 0x1f, 0x1}, 0x28) close(r4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000001bc0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001f80)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000000080)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)) mount(&(0x7f00000021c0)='./file0/file0\x00', &(0x7f0000002200)='./file0/file0\x00', &(0x7f0000002240)='fuse\x00', 0x2000000, &(0x7f0000002280)="9b3923bfddc346e9fa2aeaffae6ca386d8d50ba83ab72218340d3c30c045a89ac016797652ba04f1a203cfceccb458dbfd9fd03c4a80ef9a40dc7a4f24b6619d04a58186466fd8465757d9ee053c082cdfa957e7efab6191761847cca59c017493ef5e3d22432cf0b4ebef") ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000003c0)=ANY=[@ANYBLOB="07000000000000000000000000000000000000000000000000000000000000000000000067eb0ecf1c127df727f3e89ae14f41f49a3595524c9ea1675e02fa4ffd89aa7e339417beb7d332a5c996e59875644dd1e3a690110400bc751bb0435977d9a384089e26e8818991f125e9c0f199be2bc7f01aa0a5cb9b9f99438aa0f1ae3d50201f5eb276536f567f03f062994da292b6db0000000000000000000000000000"]) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000001b40)='./file0\x00', &(0x7f0000001b80)='./file0/file0\x00', &(0x7f0000002100)='vfat\x00', 0x0, &(0x7f0000002140)="98980e21ac8b46c0b7bedeee39e6bd9ae4088d6ab47dc9dc76a39e299ce3783aa33e482e450484961fd3e3c5b178fafbe54440e19512ea4298652ed129d4241d9d116d8a5c2b931d350f0c989f8a288fc9e56c") mkdir(&(0x7f00000004c0)='./file0/file0\x00', 0x0) socketpair$inet(0x2, 0x0, 0x1f, &(0x7f0000000080)) 2018/03/31 09:45:43 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714") 2018/03/31 09:45:43 executing program 0 (fault-call:18 fault-nth:36): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:43 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x0, 0xb6, &(0x7f0000000140), &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:43 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000ac0)=@sco, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000b40)=""/243, 0xf3}, {&(0x7f0000000c40)=""/49, 0x31}, {&(0x7f0000000c80)=""/20, 0x14}, {&(0x7f0000000cc0)=""/192, 0xc0}, {&(0x7f0000000d80)=""/66, 0x42}, {&(0x7f0000000e00)=""/52, 0x34}, {&(0x7f0000001600)=""/4096, 0x1000}], 0x7, 0x0, 0x0, 0x3}, 0x140) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000f00)={0x10, 0x7, 0x5, 0x8, 0x2, r3, 0x7}, 0x2c) 2018/03/31 09:45:43 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = getpid() socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000300)) r2 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x8}}, r1, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0x2, 0x80000001, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000400)=@ax25, 0x80, &(0x7f0000000480), 0x0, &(0x7f00000005c0)=""/170, 0xaa}, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2ed}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r0, &(0x7f0000013f80)={&(0x7f0000013dc0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000013e40), 0x0, &(0x7f0000013e80)=""/225, 0xe1, 0x1ff}, 0x10000) socketpair(0x5, 0x6, 0x2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000100)='./file0\x00', r4}, 0x10) r5 = socket$kcm(0x29, 0x5, 0x0) r6 = getpid() r7 = perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x8}, 0x10}, r6, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) recvmsg(r5, &(0x7f0000000680)={&(0x7f0000000400)=@ax25, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000280)=""/125, 0x7d}, {&(0x7f0000000380)=""/60, 0x3c}, {&(0x7f0000000480)=""/114, 0x72}, {&(0x7f0000000500)=""/175, 0xaf}], 0x4, &(0x7f00000005c0)=""/170, 0xaa}, 0x0) recvmsg(r8, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000040)=""/93, 0x5d}, 0x0) socketpair$unix(0x1, 0x4000000001, 0x0, &(0x7f0000000c80)={0xffffffffffffffff}) sendmsg(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000000)=ANY=[@ANYBLOB="05008000e5ff001f9c64c5d8e36fec62"]) r11 = getpid() recvmsg(r10, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f00000007c0)=""/191, 0xbf}, {&(0x7f0000000880)=""/228, 0xe4}, {&(0x7f0000000980)=""/133, 0x85}], 0x3, &(0x7f0000000a40)=""/140, 0x8c, 0x9}, 0x0) sendmsg$kcm(r0, &(0x7f0000014640)={&(0x7f0000013fc0)=@can={0x1d, r3}, 0x80, &(0x7f0000014100)=[{&(0x7f0000014040)="b68a4fcfeddd720074205b963bfed1e489886ad5f0ccb5e0be22a13d4ef69ca0a189288bb7a95728346e510d6875a0088a774a9c57c656756a3ccb45f6d752b906fa36001d2a686a4e1ba159d5a25c0723d4b822838c5dd2cf8d2a9944d30ba7df8625fbd2327f130ebfd2aa109bcc3c38684ad2deb242f366ed4152feb1", 0x7e}], 0x1, &(0x7f0000014140)=ANY=[], 0x0, 0x400c084}, 0x8890) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000b40)={0x2, 0x70, 0x8, 0x4, 0x6, 0x4e83258f, 0x0, 0x10000, 0x20280, 0x8, 0xb2, 0x4, 0x200, 0x800, 0x7fff, 0x800, 0x7, 0x7fff, 0x0, 0x9, 0x81, 0x3, 0x0, 0x4019, 0x1, 0x40, 0x7, 0x3, 0x1, 0xccb, 0x6, 0x0, 0x6676, 0x9, 0x2, 0x5a2, 0x80, 0xfffffffffffffffd, 0x0, 0x1, 0x3, @perf_config_ext={0x7, 0x1}, 0x2, 0x5e0f61ce, 0xf67, 0x7, 0x8, 0x6, 0x8}, r11, 0x0, r4, 0x8) close(r2) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x0, 0x2, 0x3, 0x1f, 0x0, 0x80, 0x5000, 0x8, 0x0, 0x9, 0x7f, 0x0, 0x7, 0x401, 0x0, 0x0, 0xdda2, 0x7fffffff, 0xed3e, 0x8000, 0x2, 0x3, 0x400, 0x0, 0x1ff, 0x9, 0x6, 0x2, 0x80, 0x9, 0x9, 0x100000000, 0x2, 0x8, 0x40, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x10000, 0xb737, 0x19c, 0x0, 0x1f, 0x1, 0x1}, r1, 0x2, 0xffffffffffffffff, 0x1) [ 284.242875] FAULT_INJECTION: forcing a failure. [ 284.242875] name failslab, interval 1, probability 0, space 0, times 0 [ 284.244198] devpts: called with bogus options [ 284.254210] CPU: 1 PID: 21761 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 284.265910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.275253] Call Trace: [ 284.277837] dump_stack+0x194/0x24d [ 284.281467] ? arch_local_irq_restore+0x53/0x53 [ 284.286139] ? __save_stack_trace+0x7e/0xd0 2018/03/31 09:45:43 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714") 2018/03/31 09:45:43 executing program 3: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r0, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 284.290467] should_fail+0x8c0/0xa40 [ 284.294186] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.299291] ? kasan_kmalloc+0xad/0xe0 [ 284.303177] ? kmem_cache_alloc_trace+0x136/0x740 [ 284.308015] ? __memcg_init_list_lru_node+0x169/0x270 [ 284.310155] devpts: called with bogus options [ 284.313196] ? __list_lru_init+0x544/0x750 [ 284.313208] ? sget_userns+0x6b1/0xe40 [ 284.313221] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 284.313229] ? do_mount+0xea4/0x2bb0 [ 284.313238] ? SyS_mount+0xab/0x120 [ 284.313247] ? do_syscall_64+0x281/0x940 [ 284.313257] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.313271] ? find_held_lock+0x35/0x1d0 [ 284.313284] ? __lock_is_held+0xb6/0x140 [ 284.313307] ? check_same_owner+0x320/0x320 [ 284.313321] ? rcu_note_context_switch+0x710/0x710 [ 284.364629] should_failslab+0xec/0x120 [ 284.368587] kmem_cache_alloc_trace+0x4b/0x740 [ 284.373147] ? __kmalloc_node+0x33/0x70 [ 284.377097] ? __kmalloc_node+0x33/0x70 [ 284.381051] ? rcu_read_lock_sched_held+0x108/0x120 [ 284.386053] __memcg_init_list_lru_node+0x169/0x270 [ 284.391052] ? list_lru_add+0x7c0/0x7c0 [ 284.395008] ? __kmalloc_node+0x47/0x70 [ 284.398974] __list_lru_init+0x544/0x750 [ 284.403023] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 284.408894] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 284.413894] ? lockdep_init_map+0x9/0x10 [ 284.417938] sget_userns+0x6b1/0xe40 [ 284.421628] ? set_anon_super+0x20/0x20 [ 284.425585] ? put_filp+0x90/0x90 [ 284.429027] ? destroy_unused_super.part.6+0xd0/0xd0 [ 284.434113] ? alloc_vfsmnt+0x762/0x9c0 [ 284.438064] ? path_lookupat+0x238/0xba0 [ 284.442104] ? mnt_free_id.isra.21+0x50/0x50 [ 284.446497] ? trace_hardirqs_off+0x10/0x10 [ 284.450800] ? putname+0xee/0x130 [ 284.454238] ? cap_capable+0x1b5/0x230 [ 284.458114] ? security_capable+0x8e/0xc0 [ 284.462246] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 284.467415] ? ns_capable_common+0xcf/0x160 [ 284.471718] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 284.476885] mount_ns+0x6d/0x190 [ 284.480243] rpc_mount+0x9e/0xd0 [ 284.483593] mount_fs+0x66/0x2d0 [ 284.486944] vfs_kern_mount.part.26+0xc6/0x4a0 [ 284.491509] ? may_umount+0xa0/0xa0 [ 284.495117] ? _raw_read_unlock+0x22/0x30 [ 284.499245] ? __get_fs_type+0x8a/0xc0 [ 284.503119] do_mount+0xea4/0x2bb0 [ 284.506635] ? __might_fault+0x110/0x1d0 [ 284.510678] ? copy_mount_string+0x40/0x40 [ 284.514889] ? check_same_owner+0x320/0x320 [ 284.519193] ? __check_object_size+0x8b/0x530 [ 284.523676] ? __might_sleep+0x95/0x190 [ 284.527996] ? kasan_check_write+0x14/0x20 [ 284.532216] ? _copy_from_user+0x99/0x110 [ 284.536346] ? memdup_user+0x5e/0x90 [ 284.540045] ? copy_mount_options+0x1f7/0x2e0 [ 284.544523] SyS_mount+0xab/0x120 [ 284.547954] ? copy_mnt_ns+0xb30/0xb30 [ 284.551825] do_syscall_64+0x281/0x940 [ 284.555710] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 284.561228] ? syscall_return_slowpath+0x550/0x550 [ 284.566135] ? syscall_return_slowpath+0x2ac/0x550 [ 284.571051] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 284.576398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.581228] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.586396] RIP: 0033:0x454e79 [ 284.589565] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.597256] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 284.604506] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 284.611756] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 284.619009] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 284.626266] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000024 2018/03/31 09:45:44 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x4, 0x4, 0x0, 0x6, 0x0, 0xdf3e, 0x6d19a2ba922044dd, 0x2, 0x7f, 0x7, 0x1, 0x4, 0xfffffffffffffffc, 0x7fff, 0x4000000000000000, 0x8, 0x100, 0xffffffffffffff01, 0x3f, 0x3, 0x7, 0x0, 0x0, 0x4, 0x4, 0x100000000, 0x10001, 0x1, 0x7, 0x9, 0x7, 0x2b, 0x7fff, 0x0, 0x35, 0xb10, 0x0, 0x9a24, 0x7, @perf_bp={&(0x7f0000000100), 0x4}, 0x2000, 0x0, 0x35, 0x0, 0x9, 0x5, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000740)=""/16, 0x10}, {&(0x7f0000000780)=""/53, 0x35}, {&(0x7f00000007c0)=""/177, 0xb1}, {&(0x7f0000000880)=""/74, 0x4a}, {&(0x7f0000000900)=""/119, 0x77}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/105, 0x69}], 0x7, &(0x7f0000001a80)=""/106, 0x6a, 0x2}, 0x40010000) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa, 0x0, r5, 0x1}, 0x2c) mkdir(&(0x7f0000000000)='./file0/', 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r5, 0x28, &(0x7f0000000200)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000440)='./file0\x00', 0x40) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/', 0x0, 0x10}, 0x10) r7 = perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x70000000, 0x2, 0x1, 0x3ff, 0x0, 0x80000000, 0x20120, 0x1, 0x1ff, 0x831, 0x9, 0x8, 0x5, 0x0, 0x95c, 0xffff, 0x553, 0x4, 0x40, 0x3, 0xf63, 0x0, 0x80000001, 0x9, 0x9, 0x9, 0x0, 0x6, 0x6, 0x836, 0x0, 0x6, 0x388d, 0xd3e, 0x6, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x100000000}, 0x1, 0xfff, 0x100000000, 0x5, 0x7fffffff, 0x5, 0xafba}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0xfffffde8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r6, 0x30, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x2, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x1, 0xd, 0xee57c97b4ef6f0c5, 0x7, 0x0, 0xfffffffffffffff0}], &(0x7f0000000300)='GPL\x00', 0x0, 0x6a, &(0x7f0000000340)=""/106, 0x40f00, 0x1}, 0x48) recvmsg$kcm(r2, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740), 0x9, 0x0, 0x0, 0x1f}, 0x40) sendmsg(r2, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r8}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) sendmsg(r2, &(0x7f0000000200)={&(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="875007cb1951b1d89ec294b581113a7dad0ef163843d7b198ddd78f51d9e88e5f29aecb88e96ba9291fc367382e000cb4b506179c511c947bf803e142947627a6dee66b3c061b30b1fa7dbea532425522e50872bf420", 0x56}], 0x1, &(0x7f00000003c0)=ANY=[]}, 0x40) close(r3) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r2, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f0000000940)=""/103, 0x67}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x5, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) 2018/03/31 09:45:44 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x40000004, 0x5, 0x9, 0xc, 0x0, r1}, 0x28e) socketpair$inet(0x2, 0x800, 0x7a, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000200)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000180)="b0f353445224ffbf69acffb3308e7681352a8de3fa4058c67c8ff33294cb5fc14e5bb17001d9b9f99d439d66ef3e48999e219c52172f565b927e6859effeb65b3bc359c12a51aa5d544519c1947c7d6b859b64254ae8", &(0x7f0000000240)="13", 0xfffffffffffffffc}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000100)) 2018/03/31 09:45:44 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x7, 0xb6, &(0x7f0000000140)="227976ac0f08fd", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:44 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000ac0)={&(0x7f0000000a80)='./file0\x00', r2}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:44 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec84") 2018/03/31 09:45:44 executing program 0 (fault-call:18 fault-nth:37): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:44 executing program 3: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r0, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:44 executing program 6: gettid() r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000e00)={0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000f80)={&(0x7f0000000e40)=@rc={0x1f, {0x0, 0xffffffff80000000, 0x3, 0x8, 0x1, 0x40}}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000ec0)="e935ecae2475f7ee955903c3714e0b79095aedb93ad016cd611433c33647fd4295b747e82832bb7f677f465774c430c74938674d3194d0323d65fa02b1c01f3276e26f50a44d4c12422b0a9f39cb99d4958fef61a7be5a6a4f5ab0d7f1", 0x5d}], 0x1, &(0x7f0000001600)=[{0x108, 0x29, 0x3, "bfab6ff10cf79065694806e8cfb96878357a965ecde8248073acf0242cad3d651494134f1f796132731129ef092df406e7746d95d8e162d1f012365e410d89c5d1fd7ab74864a3f71c08ffec848c391212f0660cb5493ff949d16334a39038d670c16fca2d7f30fd6491a60ec829ab0474dfe6b78cd7be72ca9b671884a1fb1eae2c61b2f51749a08b4287cb0a82950c5f0db8da9bf10c8247a2e0bb885b91299a19fa09b55a9dafc0ca71ba66d34d28ccb56a16842d6236a8e750758d31ec1d504280752365521dca70b7c418380a62dd7ac701550c5382451dbd67ffcd52db89977b6fa1f258e6f3bb9fb964d2ee2707"}, {0xa8, 0x100, 0xffffffff, "d9b3e0b699728bc2c863bbd33ffeb894a3bd42256c8f5bfc339143e6e6027783eb83e7e303a6e33dc44928a013d66bb5f6e0e16d98e10bf7f4bd8318ae77052bb74615ae2bcb08daedbafcd958228761cd779f28a03215003b8b6a587f8fe8c2e538898b67cfbe41fc77da156c9b19bac49a915fd517d14766c7eb890a472bd2f8eeaf0c490cb10efaf5c58f44feb2a5f42d88"}, {0x108, 0x13a, 0x76, "a4065dd7f6d1df3d108521ff6b4fd8d1ca2311c634fa0729217b208f3cb19664eb6d6e0ab83003609716f20a7ab939c862933b965f06d1c164e87a3a33bdcca88a2dcd3e084f365dc9eeb5e08b82ed9030cef6077ad1b3c5bbed4f411bdf6ac32e5cc183810bd054e405645d7ff4039863ef8041cacc35c10ac5a6508a86e7e0c65f3ca9a4b2e7d0c063588c1e4e4fa817bbb52549fea994fee37b9f8283270f0242f32399a38145c38d9118a89dd8adea11b06408dba3fac953ea3686bc772a5587685fd3102422f8ccf0d3a18577b77c4db1bf06fe2d8c2921f74ec25cc045670200a6f4e867f1c0c8fa5f9b333735ffedf59780b6a2"}, {0x90, 0x102, 0x7f, "f35af8820e645d23f85b4760c02083dd186fc85cde94864f7f6bd1cf837c6203f98188a4c534a952788421e3bf5f8e9772e2ea9fe790375689bca5e2d2be695eb2eac3c1b8c7d9ad88057dbb89d72a203a2d4bc129d24fd571fd836c3e75ecc1f7902074da681f589c100b8c99d0967c858e39eb225481463c0c45cf6a90"}, {0xf8, 0x110, 0x1, "70c1414bff18d1c11a246cb43ddc13e69da9dcb64e766a973ebdc46d4b8656ca6e5a213d8be1f16afa307c397b2f17b198620630b260cac84ad7949e6c5d852629353e511be798acd5ef2e0c57b43bb2d7d51908633a6431b466e93cf1d652c10b252d11b62648709988ffe05cae44e1a9d6a05fef7b159b216389908f44ec361fd929dc2a6b52a6948d0e8249efc77c78ea3023a5580c69803e879ddb0c6165eb06ea894816f362ce995aec2cfc94dc83cc4db5b74d3ea3bbef9caee185fde6cebb5887c6ecf25ab941dfb938c817ecead918b22ddd87f730ff2aff3a5770d4dc4c5b"}, {0x1010, 0x11, 0xb9, "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"}, {0x28, 0x11d, 0xfffffffffffffffc, "8bc1faac2b821b22d3dbe07da1d13bf6beb561aed9678c6f"}, {0x1010, 0x10d, 0x100000000, "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"}, {0x28, 0x0, 0x2, "5f13e6b5b56c7d8200e419b762ff18fc7e"}], 0x24b0}, 0x20000000) gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x20000000004, 0xd7, 0x0, 0xffffffffffffffff, 0x1f, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 285.548357] FAULT_INJECTION: forcing a failure. [ 285.548357] name failslab, interval 1, probability 0, space 0, times 0 [ 285.559749] CPU: 0 PID: 21803 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 285.567020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.576366] Call Trace: [ 285.578952] dump_stack+0x194/0x24d [ 285.582570] ? arch_local_irq_restore+0x53/0x53 [ 285.587238] ? __save_stack_trace+0x7e/0xd0 [ 285.591564] should_fail+0x8c0/0xa40 2018/03/31 09:45:44 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec84") [ 285.595272] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.600365] ? kasan_kmalloc+0xad/0xe0 [ 285.604238] ? kmem_cache_alloc_trace+0x136/0x740 [ 285.609076] ? __memcg_init_list_lru_node+0x169/0x270 [ 285.614264] ? __list_lru_init+0x544/0x750 [ 285.618481] ? sget_userns+0x6b1/0xe40 [ 285.622348] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 285.627083] ? do_mount+0xea4/0x2bb0 [ 285.630775] ? SyS_mount+0xab/0x120 [ 285.634377] ? do_syscall_64+0x281/0x940 [ 285.638417] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.643764] ? find_held_lock+0x35/0x1d0 [ 285.647810] ? __lock_is_held+0xb6/0x140 [ 285.651862] ? check_same_owner+0x320/0x320 [ 285.656166] ? rcu_note_context_switch+0x710/0x710 [ 285.661083] should_failslab+0xec/0x120 [ 285.665042] kmem_cache_alloc_trace+0x4b/0x740 [ 285.669601] ? __kmalloc_node+0x33/0x70 [ 285.673556] ? __kmalloc_node+0x33/0x70 [ 285.677509] ? rcu_read_lock_sched_held+0x108/0x120 [ 285.682510] __memcg_init_list_lru_node+0x169/0x270 [ 285.687509] ? list_lru_add+0x7c0/0x7c0 [ 285.691461] ? __kmalloc_node+0x47/0x70 [ 285.695856] __list_lru_init+0x544/0x750 [ 285.699905] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 285.705772] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 285.710772] ? lockdep_init_map+0x9/0x10 [ 285.714814] sget_userns+0x6b1/0xe40 [ 285.718503] ? set_anon_super+0x20/0x20 [ 285.722458] ? put_filp+0x90/0x90 [ 285.725890] ? destroy_unused_super.part.6+0xd0/0xd0 [ 285.730971] ? alloc_vfsmnt+0x762/0x9c0 [ 285.734921] ? path_lookupat+0x238/0xba0 [ 285.738960] ? mnt_free_id.isra.21+0x50/0x50 [ 285.743347] ? trace_hardirqs_off+0x10/0x10 [ 285.747645] ? putname+0xee/0x130 [ 285.751077] ? cap_capable+0x1b5/0x230 [ 285.755291] ? security_capable+0x8e/0xc0 [ 285.759418] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 285.764585] ? ns_capable_common+0xcf/0x160 [ 285.768883] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 285.774046] mount_ns+0x6d/0x190 [ 285.777390] rpc_mount+0x9e/0xd0 [ 285.780734] mount_fs+0x66/0x2d0 [ 285.784078] vfs_kern_mount.part.26+0xc6/0x4a0 [ 285.788637] ? may_umount+0xa0/0xa0 [ 285.792243] ? _raw_read_unlock+0x22/0x30 [ 285.796365] ? __get_fs_type+0x8a/0xc0 [ 285.800235] do_mount+0xea4/0x2bb0 [ 285.803749] ? __might_fault+0x110/0x1d0 [ 285.807792] ? copy_mount_string+0x40/0x40 [ 285.812001] ? check_same_owner+0x320/0x320 [ 285.816310] ? __check_object_size+0x8b/0x530 [ 285.820784] ? __might_sleep+0x95/0x190 [ 285.824741] ? kasan_check_write+0x14/0x20 [ 285.828954] ? _copy_from_user+0x99/0x110 [ 285.833079] ? memdup_user+0x5e/0x90 [ 285.836769] ? copy_mount_options+0x1f7/0x2e0 [ 285.841242] SyS_mount+0xab/0x120 [ 285.844671] ? copy_mnt_ns+0xb30/0xb30 [ 285.848545] do_syscall_64+0x281/0x940 [ 285.852409] ? vmalloc_sync_all+0x30/0x30 [ 285.856536] ? _raw_spin_unlock_irq+0x27/0x70 [ 285.861012] ? finish_task_switch+0x1c1/0x7e0 [ 285.865489] ? syscall_return_slowpath+0x550/0x550 [ 285.870396] ? syscall_return_slowpath+0x2ac/0x550 [ 285.875301] ? prepare_exit_to_usermode+0x350/0x350 [ 285.880295] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 285.885638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.890466] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.895632] RIP: 0033:0x454e79 2018/03/31 09:45:45 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:45 executing program 5: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3c2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r0, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r1}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 285.898800] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.906485] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 285.913730] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 285.920977] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 285.928224] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 285.935469] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000025 2018/03/31 09:45:45 executing program 0 (fault-call:18 fault-nth:38): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000000c0)}, 0x10) mount(&(0x7f0000df7000)='./file0/file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000590ffe)='v3') r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/file0/file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000240)='./file0/file0\x00', r1}, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000300)='./file0/file0/file0\x00', r0}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000008240)={&(0x7f0000007a00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000008100)=[{&(0x7f0000007a80)=""/156, 0x9c}, {&(0x7f0000007b40)=""/73, 0x49}, {&(0x7f0000007bc0)=""/205, 0xcd}, {&(0x7f0000007cc0)=""/57, 0x39}, {&(0x7f0000007d00)=""/204, 0xcc}, {&(0x7f0000007e00)=""/245, 0xf5}, {&(0x7f0000007f00)=""/18, 0x12}, {&(0x7f0000007f40)=""/192, 0xc0}, {&(0x7f0000008000)=""/225, 0xe1}], 0x9, &(0x7f00000081c0)=""/104, 0x68}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000008280)={0x8, 0x4, &(0x7f0000000700)=@raw=[@alu={0x7, 0x8000, 0x0, 0x1, 0x1, 0x36}, @alu={0x4, 0x480e, 0x0, 0xa, 0x8, 0xfffffff8, 0xfffffffffffffffc}], &(0x7f0000000740)='GPL\x00', 0x80, 0xb2, &(0x7f0000000780)=""/178, 0x41000, 0x1, [], r2}, 0x48) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f00000005c0)={&(0x7f00000004c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000540)=""/85, 0x55, 0x9}, 0x1) sendmsg$kcm(r4, &(0x7f0000002b00)={&(0x7f0000000600)=@pppoe={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2}, 'erspan0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000680)="7912aeb4a2217ba2a1dbc9f6a657396b3b813903ec930bca8b09e45c38af7d43d82aaaa4293a87fd3c4b", 0x2a}], 0x1, &(0x7f0000002bc0)=ANY=[@ANYBLOB="6800000000000000140100000500000085343b59ddf9a6050a6ce4b8b03a3f086e9491508868f0fdcf7fad127bbd678d92a7e98f42feb6fb7be3fa0fea8ac4885e0593d98bd59a9a18c2f74868bb1173cbc24cce59052b6ac0f19d0c466260b1ce942fe525000000d8000000000000000000000079d8d57ef71833ba35f2c8402617b94cbba2de22fb946d12bd6bfafe6d9c85e0df3f7acb9211e3a3126f27b540095c9c1fed88f910019e812a68a8d315a4c7c3fe3ed8db922433686a639769a3f04298a9a3d9df9530fde58533cd5880e86fe09f298a1dadb81753328e9e1188bc089573f1a224f821511df0fd5590accd5cc25ec40808a359eef027105f99f32a199ddc8ae9f6593cf2318080cf3c630e9d460713d906ea5b73361641b644e46143f02a530285e8b7e8d12c3bd16a2d321361ab40e2288d2e9325000000002000000000000000bf010000ff010000ab422b655a3f35d2444ceeda0963000010100000000000001201000001000000e3cde15b5b2cf915b72fc8117017832971895fb1ea97f0aeede02ff168dfbb1943276bcda9b48a0ab9ca9fa8740bd34a6159a7eeb48bf50feeb8836a05e2bb2cc3a00c9176524051b2ef5d04335c557bede4a28eaa575cdd589d3ca9f2b0b797aea927bd9d31bb20e4f4c196c3dcd188a53ef7aff6297cc3cd5aa4839e07714a36dfa9290c8df9a55c85a7a1a5ade43d8e0e4b1599859545bafda8eea022b6a6507209f3755273996b5eaeed2358017b62b83394357763a184f8c093a4524bd4af2ef15d4196b3b240974c9dd63e97321c343983d91452b3c46e74cd9efbe340e0c804ccbb85c968f88acc2619a7529b853705a28a867523606ae3f2a9a83369df776e8776d746afaeb06788dd26b51ee8cc2367909785d70f5e35d27d54cf3364b092cd457be77916dedefe7116f237d6abb5fe759243cd086fc61b8b6e1abdd525e106f3476580e589539b2dfc2a24e8d413d854c3219a57de591df5d0699bdd4e957022da3c81b81977a6e4d5c9511e82118381944aeeda1ae789d7e9f38ad461e1d5d2f1bdead58ac59f810ba4f72a151f23f49e9fdc486ff5cf56e6b741d9adfbd40fa98634c6e46651c1b5c67d694fb1e1cf0777a601d6c14657c64943130b5b0d73cba76186092c8dec253bbab54e587c7aef4fca057226ebae5ffba0c88f25dca7d236a4d0b56bca5d4bc93f023f8d0dd55edeb7591f9a2bc00cd16c3961c1ee99e3c36854e1ebb32f0db7d0afe78b478e6033bae5c4f11dccc287f80e121f25ec784f6da83c99063cab87e3950ff075f6d3aa7b9fe5bd1a168a632650e62a72e7900e51784b9b2b76cba3ec012114bc10563084257bc76a315b790ef1c9306f044dd8d8c91fefca3479fada253d00800813882a62e70ae085a0ee0c798a50bb370c9e03b979c25b94aa3455e47c4f9561c701aca258f4ca823c37679836a7967635f051cba574282cac61a5257c3ca62b6b86dfd1038d5802794d7526910c4e138a275c9bc26d8422294fee820abb5136f08e74bb2b8dca955e6f729a5e7864097495ac50ad14cb98939d89ae14a5bf623d17f0a179a30cec14f11ab20b33026048f74a15080dbe84c18734246df6f765fc844860147590057ae166ffa144ccde411374513261c85c64f5a32d4896f93a3f2c14dc1d0938021feb68ab99dbacfabf3ca3066b0cd7c16826e85e5588b4f95db36ebc5b3d45d4a934836470a88a935605de348c04a490e67961db1430c0068925e837fff16d1f04ad5e8ab70b45fcf08c9f0841e67bf778d8c4b82f88c54d7ad9a7737f944ec9ae68097ac68243ddc647e635f6f421c7ac60203bab0efb5997d0472f25c36af995483ff3baed5f8067ed3ef849a9712ecbcb6cf738148ee25d780276824b446e16b3245063e08d43f3da64ff81ca0ed639559a88b9826d03a850dd1c457c6ab250d47637aae8b568e971ddd508cb64c2b3915b6963ed020ad7eef820d74e6485cd059a3f807a6ac30d5d0b528da261b5403596b5571dbfbc2e0c18e7771d10275704bd3353253dcb70e3fdc948e76683cb5feea738a6b00bd87695c2a097cce393d55f4a20432198bdc50850a70f6d528b7ae46aefb736ebc610eba326aad06718df8874fb3a1d3956f7ce24d0052e18a6e7426d7b2d0119a66b2b85c65bfc065a9f28aae2a170565ccc51f30eab0b196d9b6a2a8f82929a0d4a6c61fc60257d41bb52e96b1b134932709a671feff8e3f36f6d7df33af5720891502603292f111cd844f648f34b9a8160327c39dde0efa26b98a09ff94154449f7dbcf44c4c4b0ea1eed12f50f9a3f4fa1c83906da81614f5f9f374501320efc943e16261cdde0f28b8ec76b1008c323389bb8d5b718ed4bc87a5fad2b05a51811936df5737bf25b3cff52dbc273351da5cc5fb43b6a4c4e0b3d1d912877be36184766c55d47b75e611f9db3b06f902238c9dcf5f1b8e6bc8facc4017a91e1c05261dc53714e733f27986afbc9578fe3a621e05ee06355cbb0cd10bf5745c656ad4eb2d08074e040e93dc492727c055497197919d1d642c43fd7e33979ace09cb88ad31537fb44ef100dad31a15e9a0ec7fe366a1f10cf6a297671a2c229c6f1aa799588c0efc9152fa25883937e6ffa89a910c7f20a7eae190737f0e41c67429d3b11188a78f57ace65e23e3d6079c2ad573b01613f9ac2edd99e02ba990733b2a4146fa673e5e53e9b4e0d3d07a0e2ec28c8ad48f99a97b20f10004945e0534aa0b07d2ca8741f80cea858815a435b5819a01ee2d7115bf3b89789abfd0842ff7a12666f506783b185db98e7a71edc1368d41d117870dd04f75e7de46dee8fb4463ec34e4e99306077b46aadab67c2857b3bf27ed551ccaa7d0a36f79c4851721da3c15155d3a19ef5ff648c0e54062331dd3948cd3adf2b6cc82fa320037eb0c122e5e81b13a8b8d1dc2552f5793121b2fbc9ea50a2e335bef910a06dcfa8c8fa5a337090aeb7f1792a1386578943d3e779e87a5b5e4d3c075528a53dd512b2d60ed08857a47128c7215ef649e92c61ce25c1ca2142ac1d676e0b67de452088cd2d4d69354b5fe1849b4f375dc000da349313ede5aadccd1ddefd646d90c5e54c5b6b9e6ac71ed7268e54c9f16bf37b0e4e9e7c16df3d998ace3c6dc5943b27275e74e393b1303906bda713eb3caa0b3870feb7d0afc722e8caeccae6a3a30a299ee0eaf27b0c5bcc527e86b781171b7d1bf5dc2b9a51aab024df7052c38955f370bf7e61208ecc0d58ccba2cb9fe1dd1d1df3bad93eedeac8717ec4a447c4d99f72a80f01b9bfec920789f43523c389dc724aeced793557ce356b744c5dba30e167d185d9fca7b90bac278204175caa9493aa6c65c5f75022871695cbe268296c80a6d5a9c477b0099d794aa827c3c2befe0b6db2bd4490c009b0bd6d691a734d36dbd0f0052a9baa90f59f1ed0d102f273c6e28af74c663275d68fe4f6a8a6fcd5403b6faca7f2591626bc4681a6f06145d661d08d0161f1762713143f93e9c16c90771819d937bb8fbace78841826228cfb47e56af09d70968302b1eff5e2f9827629dc5ee5270f607f46bd98fcbd2c6d7da758a2d1b7bdcabc4670adbc7dbea489e404b1b105308b629b3ae1b93060253969fcd14376386f4c9b27fa96831f8313fa3314564ba456ecefb1657d521a7189301cd20934d3704d67dc316726751156337ff381b09e791021f074b56df0085426a2a4a4785c7a25ec071b3936e7aaa807a77fb557476b48fbd52e1685fc000d7a839c7b443204d07a829333d6f11c80bca73d4b62531639075180854a30ecdce6fe23611a2db497d299aa5f76a6297cd0cd090fde076bdb4fa421351f45837bf51f436c1d44e36a040e71af07dd69ca51a8e31a7476e1dac5a5da5c7545de0ea5a1daf04f18710d9e208110ebfaf91f50fce4823951630b5f03be923e133861d1d7a82fc217e5a658521cedc273e654291946153a9c0a6ad205a85ea067a665f6d8de4a5de9f767bcdeed532f17ae5e747cff62af50aaad0066c8ad1e930b001ef6a643e3fa7005562ae20717402920b0e1e28fcf5cbbdbc6794de839e5d3d410d8999e84fd957e3c5a86d3ec78e7ef662f8f647905281df08be9f85654da658246956a7dc8c52fec429a08b6f8a4100f3443880d4bbcf8059d451d10483b096d36dd951998be8a85650bb066b10171b6e3a6dd6dc655379be9f655f4095096e295c55a32661d00a7328c4aa1a0ec5924ba97f376babe2e122bd1346d06e9d67d0eed73da7e279f482fc04eaaab21aeffabcc759ae00e112b6ef184035ec0dba947494ab5af28f3ef56ab658e145473d07e7f9a89d93da2eddaf90c4e074a4824b71ba807b1c41d7e129891200df81d7e10b11606eda3c5e040f71376bb12f644df6d9dd345d4ad5ff05baaa7a10a35dc7cdccd524479b7c2ee269f3485bed17953b29a4c9a18024c7436cba7dd6fb8d8c18a9fcf0f6030b91e13b73412b150eb3873059de951c345ea216d18d968d498979de00ed4b4b5e051c0ec232781d52de13d785c7e9924d437056c92219f6f8861b78d3492a8e07bf91a79a06e0528145a871f39e8eb413fb7222c3c9fb2583d614b1ca19dae19d6d5481246a2ae67ddc035db267a8a38b0a65fa8268a8682a958a7f8a57eba5950c6f1b72ff1c9b40a7e968708ad230de7a34f77e0abd6ce682a2cdb90a9b3572852208a7717108bcbab128f4a9313eb9cdf6c4342b05f8900eab8d29bf107d1901fe98c89c3596f0ed7fe1c9ebf5801012e78fa41e56251e20e70db62f32861a6ef375133b01e8399bedf02db0c85ab9fe438ebd20adedce8131bd9e8ebbf69ed365704ea07f5d2d7324e436690b70ce888c6761c0fa77243cee27126cdeb9a2255489751290d98400024da86ca3eda80db7fd90be0c259d82d4c4732b60f700dd4185a609d22203f5265f5af4722003b8bc911e53a01cd07f2885e6c58a4bf00246206dccc29b079811604349ed2cbc8e567cd9b5b70ddfe0aebb3bd9b20494327e27390d6f6c370f06293f4dc5c5073e8857c3d94fc7a1abc80083deb54007aadf88613caa12bc2727bc3be266f0d898e6f2131a9a45b2d6c986bb4042a0761569d9b566e8293f706d38f4fa9de7bac0e4688d5b883a719baf9ac1c498ccd9ce23d8926b0d7e75541cf4b85aa3c731655172b418a5b8412ae1252d35a8b20347822dad8ad03eb2bef5d63fd9f0668709efb7483fda087f2e42b6cc17641cd12d52b8c575d07bbe9ffe1d8b5063a886d6829f5f64285b73fe10a59b702a70c2dc454369cfa06628e5deb1ec18668a9bda7ec1aa7d4d4edc71cc11dce71d2c1d04aebfaca034eb9011aa3d949a4cba95ce975254bc7ee96c953eaeb9ccc3bb3da9c9a1daded1c5d00268cc0e09ed999a5c2c10647c7dc62569190d11c5693e984069065f737af761b89c2a91d9873733a639939c6cbedcd676224d3001f728baf273d89f707f2b7a2d01aff49743a062ddce0d64cfdcd2aba828c790e09032f429ec675799e6d8e26b042025a3f577371eb591d34fc7e3f11821d60f5390264c537e08f4251162730243d5de6e74527ffa1bc648b373703d5e3c2f854057196875a2a8437dc6caf5ef001c92c197842fc8ad06d72baafeac959db44ccde67e177a4b95da514c51f761fe3e6653dae46f066b027407bd6ef76a936d40981f055e014acd7229ca7ab20165f27ad857dba4997c1080a71769187e48bcaa6353eeeffa580c74f585f2e96ed2d70b6dba7bc8e5976a5fd7046f48a4d6ebf76f00fe66dbe1d21a469e71bb4bc8740183e56cf744e17769ff904b768a3e82e01c15774979c697506ef7b664f7e665971d2eb3a7116f4d8e568e5f1c18d83d79b6abe7e2e104f70ad42c13d1b1c1681556a5a7717c71a03097618884ba7b880eeae40d22169726de8d52741b28c45db8764468bf235581239e7ad4393c890f26211eea67d9d3c13d20dcb2e09a87311a233801ea5cee2ff3dbb848669589d1d12b8e714243914f61d49a1042b99a560ef08517e378fcffae80199d7cd8971b740f15de2bf134088d4436601dfd30d337310e960f3db892fd4c32399904c83219eef53909075231965112d5f9169bd41d0e1bdac56289a7709d4109f10a147e5735de7d481e38f129f04d3d551766c2f46df99cc8e5ad9c4f67857af3775da56b1eb00261a5f48e279edb206d10c7d31d2cd6ab45d0dc2b43cf48545b939690325ac86c5d70b33a2c601c5e6174e4e637675036441ef16973789a417cfaced32d7e853df7da8c7fdffffffffffff0b010000ff0000007a35baa33838d5a38fa3d65f45fbf9f0f5b230be50192b9e4f13adc8da679c171b00000000000000c8000000000000000e010000070000009621811ba662c2bd6c435c9dab49aa36ab5af75d6a2c58ff7e5748f29b89b38649f99a9af26d16b5171e124cfe28c9fc0be6589e86195d837c78ccbf0b473be5a1cc6239e5a671bb1e60c10c4172828a9115af3b1632501a60e295d315fbf6b86cae891f38c235511086408ccff486bef488ac2321a3d83a310bd08d75f4497e884a75b036357ae13a31fb609d2378c6979d88dc2fa54abedc675254f07f3aea5dd7246711bb6959ded4120d9c231c32e700000000000000280000000000000000000000000000800cf64f34850ec554865b71225e11bb011fa459000000000010100000000000000301000001000000cc0c3f7054d8fa3c519670d5b8179e30a927b43bf20d0a30d118e733610ca709a3b8ff1d60dc97856444251b462cd2cf21cbd2de53a2c71876ec751d7a8ad7704dd3b6339552ee2b48a69d3c4dc271ec3f1e1adc3b3fcb2580ffe17d604b0e2958faf941bc918cfd48698c2d97fbc08f4bd98a3a51e458b26e95b9044c3f9d1d9e7d91c7dcda28ae2868222a578a2e56ffdf751927905ecd9e9171b6f9c4210a6e4125a6c11030abc99e800463ec7bb9df14f477d41d8bbcbe85999729566b6906bf8337b3c449b93b7730bf35bfe1f5cd64814f10a4a79ea70524bd1192f456dee71d3c33be79cd1d7dc6a1e9f8af614f35e6e148c6a0b454a5ee52e9cbfb23073358cfdccfaead9df17255d228767698babe454261552c0e1e012533c6d9536c9eadf9f52c770d567d9eac0b6c3f49cfa57de534af2bfafcd947895d35426a07ab70eaaeff8ffaef5f40549a22b7e9ab06c0eb45a2a2c444aac718710765aa2514c2a980129f112079efd73090095e4384994855695a6664e580a8b0f57049a0eb1110ece706dace15f87cc1b882fabb49c73bfe8735200c92947b2ad5e277499b6828a07189f86790ff876c11e334576c6aeea2ccf688494fb7de87df644878eb5b305d75e9edf5a32c0a5247b72d76483106c145d9f8f452a980d996a177c9e36078087d5230bee0c85a0e211934e2addba4fa274626f03e219fdc1a037fefc4293060d01016648ada683424fdf783a557d195746c3689cd97bc13ae90c9ca883af92f9f387a9320da6b7f129beb6109c1ca2cddd697ec23e6b3cc5a1d715cdc9bcd19babdf14f8235b8abbb47fe6b264fc9be05eb956c1e1708812e4184f5ea7715c33fdef45bb580802f10370fd2d950b4b78a42702907ad51e3d799ad1743a1fa25ecefbeab8901c6d483c4921573ca64b2b3ff7dc6433272079928d0ce727c5c8eedb37ec6a9cee13e9cc221966477a3686c960af8480d5fd37a3b3c2e51ae26802fca3ff1d57c4eda486faf210326ac14b5285883aea87849f06455aa07100ee0eaf40261177d010b08eca1563efc8708664af0c22f96c21f2f2c877507549cb42bd210c57143848b58d4e393e33cfe4deb8dce9cfe2103bfa08d03b607dc0b96de2da8aeb98ccd7bf4a45e2d4bd84a9dd73de080b8ddebfd73687ad37f45f488a6aaf314b3c4d0ab7bbb6ca642bee493ba6e12963dd51f84a6de4f31c4f52c986db28987de73ea31f7a5d93fb430b976186bed135cdab3460964a4ad7fd346e02e9898eec8b4b9be232169529528d6a951e7ec97f2125efc17edcb3d855d786441aeefdc0698cc95be82d4d78e5dc2fe30b1f8288dc13fe9a446e736580df8b5077db683e81f3eefddd87fc0c79a0390da962e25727d2d444a92109b321312941b90f66e7c2b6931cceb209f71430e95160a0094f693a7d6ed80363cbe679df9915fb180c1b602d3026484f4dff5f669abb41b607c50cb64efa04dceef13997337d98272c808734a76cd0444e80d9e4070d721fb583a66631d6b6d418dc3e0c7f007fbc04812ec0d17a84a27ae23401bcfcd9b323552a0ebaefaaa31d0731eb5a4d0d39c70a50a43819e62f489958ba005a33b561e9a8698c1c06f6279ae6058ae93fe0dedc75ac6e1f5c5ad6e4aff24b6c585bbd57b8013db947d45ed6242906742366eccabbe19431558f28d4f1c7d4fd71b0df40f19fbd64378bf4ea42001dd250cada80ef15021b319c0870dc582f878a7be313a0316898af0c262c1bfef7f9941b8263951b008dca7836597c6c69498573aa0ee3202599db9921bcdd1fb4995d0a962d8d144980f179ab462cf098f9b57fa8e208a7d0e3e92d5a206762633eba5f0ddcb2a13d49fc150f59b284f9c905d310b5cf6ee88457238387859456f50bec1ac3e15cb4712e1ca2b570a311c3a9e1d527c4ad86bede0920c75baddf9bf918e8d6dcec10a42736cd1be7464aad1855469d0942b69cdad52f5e3eb167b3d1feebb3ac44b37968f13b7ebd9c5cd2e5bc844f363d2a6ceaada3880a626fcce473bc003d2f6fcfe79d87343eb3065f892471ce8b9e88930d95ffa81de4011a0b0822def081a396dcb3869885c54fbb4c5619994ceeef31b91676f73eaf82637f2dc85eb386b11d66b3133cb8435699dd41a2de1defb087483745dd26d84f1852e7448f0ddcc02ad42bd5e6ba2c1758a804670a8ac18d786461f401acd1067568dff5a70a59651bc6110186e0a0f75a6e43bf464073044df93fed95c84721f4fd06ae94e6a8c059245062fcb203033ef86fa8014db0e5da6c4628ce15add3480bf93fd4872b3841f09400f5d401fcd990c607da10742f9e4c4e534da32bedb77d5d13c776fe59b41efa8aa2f494f33e7aa607b7f1b8c3c3f924f5bc9d7e7dd7579837667337ea2736adc108a2191d5f679790c3322879bccd21649194d2fb1035a87d0b27359ed2d6c307d95087701d21012fcdb5061c9cc6cd82531e22236f17973cfe393f2a5b9a04c3deaf4fed4bab437cae82ec8d2530cdafddf899e797ef6c7a77cfd5c4bdf9091696dec685b34feedc3ec10dfaa27baef666c5df3e329a340cd7d6d2f10502e04517a1de499f14650611c2f9416eafd193651c0ba18524e68a08b2bcdc4dc37cd9fc78f87ccbc086386b72066d69a63ef69079d64c9420721afe2e3e49df9febef1ad6cd7ec7313953504be99e76fc5f91dda8854f36c5b5d5519ca56df8941f600752d966ea7efe02e3366f72a0d7a27210375b89ff2a9579f914b629e1d09bda766fbf4217c93cbffc1409f6c82067752cb681a51678506e6daf42cc90e39a3d5bd7ef8003758c45865dedd279b7f611369ab83b421c1cc4dc02787f758df23c4fff7b05192b9bd6633b63ac14f93d9cce311f0cd1cf6743b9cde2ac74c2c801ee90fef960cc513af6064868c243e8a1347adfd090bb72cdccb074a4c755f2478c3c158a7a88a3cd49b6b614ba1b79d783c72431b8ccecb3b9987416b811b31e4ba872958ed6c7b497f873342485194a00c4c800dfa315053648322141858c15a0cc812ef498877ca5cfabb6be4193fd9bebdd32e7a726d05db9a0f55497fde6827e9fdfad7a750c25c490e3672881a5284e84de63e11d82f99bf6b8a7014a9f34233a8a826ed296b7a9fa9096280969f01442f74e10f91147275c4bf75c315d493ea35b45ec702a8ed1ded108ef36d7e087c596fd509953cc74b791f164429915cb8df6a5f823c4b684d64c789a83bec9be6d426ca1630259ab159ad2b2ca464ee74e6e7469502a85d2479f7996276996b18c1f2f19396c523ba52b3f955bc1f1bbfafd01a1eb4072c2dd016b84e85555ae5f74a211c5a20688d111aebeef5886c3a47fed0c499b369615a95785c19106e5901a74fb413f846dbd213d2d9ba018c75a7b50be7f43d63432d49ce08be2db8ffab3c938956f4378c0b0b99e96ab9f6a357c574cad3893570b0f95263b52f28e20250483f48dced2a0eeb6d4028e2e20cb409eea1988f4fff9506ed5f7eb090a6fcebaf479c0c4f5f3da2082171430bd930a287764495d20b5c34846fe0ef5ce7dda20fbc1c1c7344fd775184f4e3ab9eea005fb537c8a2bf7687993e652d061457d114b721ce97caeb82d1464fa1e7900850ba9616f266391edbb4a27e6fcc08c64d6c4d7cdd9d89ed87303c3833186318f94bb6ebfca301e1ed325b6826ca9f74d091e66c752fb42429f6dc12844c0a368a04df838dd6a34e60aec5bbd8995d0863f445ff35929429a6c2f87a03205df00e6d6264745ccd68f7525ced02af8a7fb36d37c4c044ae90a3a8f28082ee11a754c6d05ef16099d7acc33761a72c39bee49440056c1076db3215834770b7523befbcc489c763206c563c02e0352e6319af3b3ff5fc137214ae5eafba8a79a39645742612f8070acb21bc47fa3001df07ab14f47b2030e261a5b362d708d95ae2b449607e7966817a70006bd679cbf885291237e5d0880e49e69c4331a760afbd7dbe3d229c6e40d44e0267e651e51704e95f4baa89672bf8949fc977115902bc25156ff569fb8a9a7b7b9eba40af71d3ee02e0f2b3471d20f8315cecc5deaa09d352ce32d4c2937baed131c8ae6b213101a134051e3f2f517a8d5229a94d80444ef8f7ed5c5a0c8cc2093892e51ce150e1a10328882eaf80614c0e7b08c25e5a99d1223ff1ed15c549f22e48da67e65bc87121f0c77f71b3c39ab8bfcee173388fa82df46fce6a0b538e2e94b6cab9fa8ba4d0bccfa336333e30f6046daad5192496307c594041bbe3b61ddc728a25df29cfca1b4a841216640a2700f0d358a47c75e87eb190e0dcb308699200ebdcaa2bf4923c6ba3746ce8b0294db985800273cbaac735d01d1437451af3c24e5d9b6cc55b4a72fbabe3dc7074aaf12a16b98c60a4e17d95c45f7d037fb9d3f936a4cce1318b68adf802ecff6f8266df9a7232a43aa89572bda4b9369789f3da367b1e8a749cca9fae154df520d3b03e7371eb97b7276b575d0b051d0bc1f6b113cdb09b74d48be64794bcff416baa4934da9c988dffcb89109cb3bcb43446a7362eec7f3d976fa6123ebb2504b395e59e715fa7f4aec76aced262885590592be9d72dd5a7638604f811ce4c0832b414bac767ed0944199c0b2d859b1df9b3f72a88875c5bf0c107d0e464d5369fcb84317aa6f92ebc7ce35cbfd99c6bce2d2a923c39bc7b558e276b13f13750da4a5227cb66ef7d5a9f8c10cba9ea915e7c1c9e2f3db3c0a7dba7e5cc72e600a46d65e4a30f93d753517dc6cda0236ba4abd132c1ce81dbc5115ff66a12e0db88932edbebee2c5fabf2ea28680358d6e84d5e64c4846a890b30a3bca341fc673feaa397b4395bad100a0a73fd18b4db72b9c7435dd13742418f9650f1aacf941d1bf86e38e31f91decf1580c30f5bba821b1b1d23dd7c8a4147e9a909ce0fa97913f0b10981bbb2125a0221c010edeeb31eb617a01294ad13eef6bc485fb4b2ffded96f38cf24c203bd9390ba1a06deee4e95659c686b159173c81d6d7a941725bb1252c35aa99c4cded6cc1ad7921e1107b2dffaebc7eaf63cee961f5a925b3aa0a16321e466b0ea23f933bfa120cb07a4034cb27037ac4dfdd5bf4efb9feeff095236c3c66d2f19e71c62c8828fc3732e92450e73d9ae22d864932bd7c7245b770475ae36b6ff8d55f23baa737c73db746fd806df8168cb4e665710192ca6906dce60d88f2f31bedc4eb8f4e95bf02a8d483e037a95a6200cb6ee4f6d8c5fcd9dcf81cfbd7619bfd653f6cef52a886816519c3b1914abfa8cc7186dc27fdd2061b58e4fc717241fb3048e633f65989c534a6ccf94f6577cb108186fb531c19ff191280238cabb186b4c02c1666b76a8b1f1a720d444f94dea04274dba5c71883883700134f66be11b8465d0292fc95dcdf1403e4398400bf2f115883fdb45b3f6a5233ea2e076b1610ac0f9a8b022b5659a7890f68cc937ef1c0a010caa527f1c5ecab4a0797cc5ea090345ea1899a2f633dabd20215ef121b801c79eb82f8ff7600ceb07a1962a0535236dc7439552860a41ae6bb20b8eb4c1052de1c456bd2e9b3b3ff65ddb08575e3100fbaa8a22ac0cfd9e8b50d60c66c11a2adbea005d8f72eb4d9652e9f79dd2838e73d8310b9ecf914f50993b2a1eccbe08afd0b31c96f23c8b6879c09de4b42f1bc599682b7fc67912ba502255c370a8cf60a7a5833febfea62b420762872505312391a37a6735eff93a7a0b4aafbb3ead90fa8991a01f2a8a406522c8b8000000000000000b010000ff0f00004d7dbe37b2cac48d33e0d2a9dc4e7efbc2f9f5ab9a0e14b125752e8f636a0d4535d24ff364a81d5320ad5aaf018ed4d248b5b98f86ca7fd62507ea99a01581fa331fb60bf08d07767dd9013e54b449f63566bc6d3dc7edd2d859bcc93641d65af8b3f297d2189c547dff237d45f3e92b26151b9d2f88e881a74daccbfbc17a4eac76a2aad9de16ad2da0e9aa9474e3d0c40cbb6abe29c9899dba9e5d2ff0d5805e274574c25b0000a00000000000000071aa871a404100001d5a77318522ac278c6ff91c0cd1440e043cc548486b29d5f9e09e0942ec0fffa47b64922a50d132cb7dee793bd1631319757573be835e404ae804ac70533ae19ea58a33d719639fe33d5b449feb5fae907cd88ab68696404232a56d65a2deebb75827cd99796ffd27ba4e90b951725da32783675637ce80f592107dff8e675eb0aadeb98c240260f235f5a68cae077922b2de528c4b93ea8d51a02be75a8b2eee26f26795e2e15c9845398ca0c74fa0f0e56bac8b762a902756e92e548ffdc18800be6f79f77f9ec59febeabbb351c3ea7a11dfdb52228758f5dcdfdac3c7aeef79e7d99b6d363cc0f3d38ed6e2f77f295a18f876c0bfa63f7c2aae61a4b7cb85cb24c900e59d04e84bef8efc10db385545ab7e59ae5cae39038b35fa921fc8c4be5f894463c0989d241eb11506bc455fbe88f8a25b"], 0x2400, 0x800}, 0x0) mkdir(&(0x7f0000000480)='./file1\x00', 0x20) socketpair(0x1d, 0xd619656b165eda75, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000002c0)='./file1\x00', 0x41) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x3) 2018/03/31 09:45:45 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x7, 0xb6, &(0x7f0000000140)="227976ac0f08fd", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:45 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:45 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x5421, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) 2018/03/31 09:45:45 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec84") 2018/03/31 09:45:45 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0affffff0c04c5275c84"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000001cc0)={&(0x7f00000004c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000000540)=""/131, 0x83}, {&(0x7f0000000600)=""/217, 0xd9}, {&(0x7f0000000700)=""/87, 0x57}, {&(0x7f0000000780)=""/232, 0xe8}, {&(0x7f0000000880)=""/248, 0xf8}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/144, 0x90}, {&(0x7f0000001a40)=""/54, 0x36}, {&(0x7f0000001a80)=""/247, 0xf7}], 0x9, &(0x7f0000001c40)=""/118, 0x76, 0x8000}, 0x0) sendmsg$kcm(r0, &(0x7f0000001f00)={&(0x7f0000001d00)=@ipx={0x4, 0x6, 0xc3, "11491f0129b6", 0x8}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d80)="7530a9312c83009a17f9b9a3990fb3a816363e2e5259a3a1f69150", 0x1b}], 0x1, &(0x7f0000001e00)=[{0x28, 0xeebd2d4ae92bd91f, 0x5, "b03ab9dda4d0a898466a3b4befd4781d5085478ebd3a"}, {0xd0, 0x185, 0x5, "6f9edbc3bde9fdb39724d7a375cd21a04444485cc4fe707d86a8167ff75c6bc01437b86a73df6806b85449d65710d6a81c8b9bd36ade26babd1247b8a8a020bfaab0c1c8805a02fdadb2a6068f2df6c19b6ea956e39a45fe2d903bcdc952a431889a588f579f4052d4447addf92998a44eca462e4f649f9c1dfbbe345de264f0544fa043364dba9b7202e5309aec714c179f425b0f2d6b6259a71b14eef427cdf04d27b753da9cfa8b2eae1e6e27339b2d6ba89e5ced9f08e428b8c4"}], 0xf8, 0xc8c0}, 0x40) [ 286.186418] FAULT_INJECTION: forcing a failure. [ 286.186418] name failslab, interval 1, probability 0, space 0, times 0 [ 286.197817] CPU: 1 PID: 21829 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 286.205074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.214408] Call Trace: [ 286.216988] dump_stack+0x194/0x24d [ 286.220604] ? arch_local_irq_restore+0x53/0x53 [ 286.225255] ? __save_stack_trace+0x7e/0xd0 [ 286.229574] should_fail+0x8c0/0xa40 [ 286.233270] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.238349] ? kasan_kmalloc+0xad/0xe0 [ 286.242213] ? kmem_cache_alloc_trace+0x136/0x740 [ 286.247028] ? __memcg_init_list_lru_node+0x169/0x270 [ 286.252189] ? __list_lru_init+0x544/0x750 [ 286.256400] ? sget_userns+0x6b1/0xe40 [ 286.260264] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 286.264994] ? do_mount+0xea4/0x2bb0 [ 286.268684] ? SyS_mount+0xab/0x120 [ 286.272283] ? do_syscall_64+0x281/0x940 [ 286.276318] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.281659] ? find_held_lock+0x35/0x1d0 [ 286.285697] ? __lock_is_held+0xb6/0x140 [ 286.289738] ? check_same_owner+0x320/0x320 [ 286.294038] ? rcu_note_context_switch+0x710/0x710 [ 286.298945] should_failslab+0xec/0x120 [ 286.302895] kmem_cache_alloc_trace+0x4b/0x740 [ 286.307450] ? __kmalloc_node+0x33/0x70 [ 286.311399] ? __kmalloc_node+0x33/0x70 [ 286.315347] ? rcu_read_lock_sched_held+0x108/0x120 [ 286.320338] __memcg_init_list_lru_node+0x169/0x270 [ 286.325328] ? list_lru_add+0x7c0/0x7c0 [ 286.329277] ? __kmalloc_node+0x47/0x70 [ 286.333226] __list_lru_init+0x544/0x750 [ 286.337265] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 286.343123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 286.348118] ? lockdep_init_map+0x9/0x10 [ 286.352159] sget_userns+0x6b1/0xe40 [ 286.355849] ? set_anon_super+0x20/0x20 [ 286.359797] ? put_filp+0x90/0x90 [ 286.363226] ? destroy_unused_super.part.6+0xd0/0xd0 [ 286.368304] ? alloc_vfsmnt+0x762/0x9c0 [ 286.372250] ? path_lookupat+0x238/0xba0 [ 286.376283] ? mnt_free_id.isra.21+0x50/0x50 [ 286.380666] ? trace_hardirqs_off+0x10/0x10 [ 286.384960] ? putname+0xee/0x130 [ 286.388388] ? cap_capable+0x1b5/0x230 [ 286.392252] ? security_capable+0x8e/0xc0 [ 286.396374] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 286.401537] ? ns_capable_common+0xcf/0x160 [ 286.405834] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 286.410996] mount_ns+0x6d/0x190 [ 286.414342] rpc_mount+0x9e/0xd0 [ 286.417682] mount_fs+0x66/0x2d0 [ 286.421025] vfs_kern_mount.part.26+0xc6/0x4a0 [ 286.425579] ? may_umount+0xa0/0xa0 [ 286.429179] ? _raw_read_unlock+0x22/0x30 [ 286.433301] ? __get_fs_type+0x8a/0xc0 [ 286.437163] do_mount+0xea4/0x2bb0 [ 286.440673] ? __might_fault+0x110/0x1d0 [ 286.444708] ? copy_mount_string+0x40/0x40 [ 286.448914] ? check_same_owner+0x320/0x320 [ 286.453216] ? __check_object_size+0x8b/0x530 [ 286.457686] ? __might_sleep+0x95/0x190 [ 286.461640] ? kasan_check_write+0x14/0x20 [ 286.465849] ? _copy_from_user+0x99/0x110 [ 286.469975] ? memdup_user+0x5e/0x90 [ 286.473661] ? copy_mount_options+0x1f7/0x2e0 [ 286.478132] SyS_mount+0xab/0x120 [ 286.481561] ? copy_mnt_ns+0xb30/0xb30 [ 286.485424] do_syscall_64+0x281/0x940 [ 286.489285] ? vmalloc_sync_all+0x30/0x30 [ 286.493404] ? _raw_spin_unlock_irq+0x27/0x70 [ 286.497877] ? finish_task_switch+0x1c1/0x7e0 [ 286.502349] ? syscall_return_slowpath+0x550/0x550 [ 286.507250] ? syscall_return_slowpath+0x2ac/0x550 [ 286.512152] ? prepare_exit_to_usermode+0x350/0x350 [ 286.517140] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 286.522482] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.527732] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.532895] RIP: 0033:0x454e79 [ 286.536058] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 286.543740] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 286.550984] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 286.558227] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 286.565469] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 286.572712] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000026 2018/03/31 09:45:45 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000c00)={r2, &(0x7f0000000a80)="a758c89448073dedd336f0aea4b675523c8ae6041defb6d6f53a5bf5f1fb9523e4fcd7161b70f7db98a1a1f0ef304ca617619e4d4a8bdeae5f50a8dfe689b34f1534a87b4553919c061d864ad7170245ca0df4b75b22337761a4606f80b66d1ca87030b3ef49898d396d206574698952874d9a4fb4d0acb935dfe18153cfd2e2b4a6ca32848325adba87b0f69933490fb195e72e993aac2e7229faa5e0f577fc4292a0e31d97da413fd10fdb68f25672917f2eeef9cfe199948f33f905b7a7e9da139474bce219f744c7edcffab2b8fec9e763c39c6ed8e9ff", &(0x7f0000000b80)="af581ab239ca7de9c017a4c21f6a96b87e65f7c62f856d38a2e43031b47a1ed48ee27b2314561b06abbbd64844ed6b7fe766adc7c8cac35a80a11f889bd66ae2e0300ac5f3fb3b4cb10ca84aff80002d6a2234", 0x1}, 0x20) 2018/03/31 09:45:45 executing program 0 (fault-call:18 fault-nth:39): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) [ 286.584579] IPVS: ftp: loaded support on port[0] = 21 2018/03/31 09:45:45 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 286.897123] FAULT_INJECTION: forcing a failure. [ 286.897123] name failslab, interval 1, probability 0, space 0, times 0 [ 286.908419] CPU: 0 PID: 21864 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 286.915673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.925000] Call Trace: [ 286.927569] dump_stack+0x194/0x24d [ 286.931175] ? arch_local_irq_restore+0x53/0x53 [ 286.935817] ? __save_stack_trace+0x7e/0xd0 [ 286.940114] should_fail+0x8c0/0xa40 [ 286.943804] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.948880] ? kasan_kmalloc+0xad/0xe0 [ 286.952741] ? kmem_cache_alloc_trace+0x136/0x740 [ 286.957557] ? __memcg_init_list_lru_node+0x169/0x270 [ 286.962721] ? __list_lru_init+0x544/0x750 [ 286.966925] ? sget_userns+0x6b1/0xe40 [ 286.970788] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 286.975517] ? do_mount+0xea4/0x2bb0 [ 286.979202] ? SyS_mount+0xab/0x120 [ 286.982801] ? do_syscall_64+0x281/0x940 [ 286.986838] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.992180] ? find_held_lock+0x35/0x1d0 [ 286.996216] ? __lock_is_held+0xb6/0x140 [ 287.000255] ? check_same_owner+0x320/0x320 [ 287.004550] ? rcu_note_context_switch+0x710/0x710 [ 287.009453] should_failslab+0xec/0x120 [ 287.013404] kmem_cache_alloc_trace+0x4b/0x740 [ 287.017967] ? __kmalloc_node+0x33/0x70 [ 287.021912] ? __kmalloc_node+0x33/0x70 [ 287.025858] ? rcu_read_lock_sched_held+0x108/0x120 [ 287.030853] __memcg_init_list_lru_node+0x169/0x270 [ 287.035853] ? list_lru_add+0x7c0/0x7c0 [ 287.039802] ? __kmalloc_node+0x47/0x70 [ 287.043750] __list_lru_init+0x544/0x750 [ 287.047787] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 287.053645] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 287.058636] ? lockdep_init_map+0x9/0x10 [ 287.062671] sget_userns+0x6b1/0xe40 [ 287.066356] ? set_anon_super+0x20/0x20 [ 287.070301] ? put_filp+0x90/0x90 [ 287.073727] ? destroy_unused_super.part.6+0xd0/0xd0 [ 287.078812] ? alloc_vfsmnt+0x762/0x9c0 [ 287.082756] ? path_lookupat+0x238/0xba0 [ 287.086788] ? mnt_free_id.isra.21+0x50/0x50 [ 287.091170] ? trace_hardirqs_off+0x10/0x10 [ 287.095464] ? putname+0xee/0x130 [ 287.098906] ? cap_capable+0x1b5/0x230 [ 287.102773] ? security_capable+0x8e/0xc0 [ 287.106894] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 287.112054] ? ns_capable_common+0xcf/0x160 [ 287.116355] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 287.121525] mount_ns+0x6d/0x190 [ 287.124866] rpc_mount+0x9e/0xd0 [ 287.128210] mount_fs+0x66/0x2d0 [ 287.131548] vfs_kern_mount.part.26+0xc6/0x4a0 [ 287.136105] ? may_umount+0xa0/0xa0 [ 287.139704] ? _raw_read_unlock+0x22/0x30 [ 287.143824] ? __get_fs_type+0x8a/0xc0 [ 287.147682] do_mount+0xea4/0x2bb0 [ 287.151196] ? __might_fault+0x110/0x1d0 [ 287.155233] ? copy_mount_string+0x40/0x40 [ 287.159440] ? check_same_owner+0x320/0x320 [ 287.163732] ? __check_object_size+0x8b/0x530 [ 287.168203] ? __might_sleep+0x95/0x190 [ 287.172150] ? kasan_check_write+0x14/0x20 [ 287.176365] ? _copy_from_user+0x99/0x110 [ 287.180492] ? memdup_user+0x5e/0x90 [ 287.184176] ? copy_mount_options+0x1f7/0x2e0 [ 287.188642] SyS_mount+0xab/0x120 [ 287.192067] ? copy_mnt_ns+0xb30/0xb30 [ 287.195928] do_syscall_64+0x281/0x940 [ 287.199787] ? vmalloc_sync_all+0x30/0x30 [ 287.203906] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 287.209502] ? syscall_return_slowpath+0x550/0x550 [ 287.214402] ? syscall_return_slowpath+0x2ac/0x550 [ 287.219308] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 287.224653] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.229477] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.234636] RIP: 0033:0x454e79 [ 287.237806] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:45:46 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file1\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:46 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633") 2018/03/31 09:45:46 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x5ee5, 0x4, 0x8000, 0x6, 0x0, 0x5, 0x4000, 0x8, 0xffffffff, 0x100, 0x6, 0x5, 0x9, 0x5, 0xffffffff, 0xfc, 0x100000000, 0x9, 0x3, 0x5, 0x1, 0x80000001, 0xb, 0x3, 0x8000, 0x3, 0xe2, 0x2, 0x9, 0xc60, 0x1, 0xfffffffffffff9ba, 0x800, 0x0, 0xff, 0x9, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x8, 0x1, 0x10001, 0x3, 0x3, 0x6, 0x20}, r1, 0xd, r0, 0x1) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffff001, 0x3f, 0x0, 0x101, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9, 0x0, 0x0, 0x6, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x5) 2018/03/31 09:45:46 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00'}, 0x7) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000880)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)={&(0x7f0000000540)='./file1\x00', 0x0, 0x10}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000680)={&(0x7f0000000380)=@in={0x2, 0x4e22}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000400)="8c6fb23642a93009a7fdbef9f15b3c3a45552e6a1e00be6d4f57f51c42715ac14e2d43e8804f8ef4e39afb738b4a1f0b553de73c482aaea48c3b4c040e9be4c97daffecfd53a8152814e55dcf16b2d284defef7e6bce0aa5fc1944baba47a6a0b98498ceb5c58490eb6260e9826e2c", 0x6f}], 0x1, &(0x7f00000004c0)=[{0x58, 0x10c, 0x3ff, "73961f014225ebed94b3ad27f0c239b5a168503a5de61f64ffc59b596ca2ea6dacbda23b6643f1df1f4d6db9b821f768469f7eb2c5f88965f4039ddd1ba6b73b689b8dc68b1c"}, {0x20, 0x116, 0xfffffffffffffffc, "38703ad37fe32f0d14cc444b1082"}], 0x78, 0x8080}, 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f0000000700)='./file1\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") mount(&(0x7f0000000740)='./file1\x00', &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)='ubifs\x00', 0x20, &(0x7f0000000800)="28fe7abf55aa4e04f52c10370ce13160cc43fb94e2a1d83e514f13a6292eb2700b5891d9f7295152fd5e2df81c132447b665ee38cf4f1bac93680af25559608e730fcdf4a3ee58685b063f65f25b3b877a1a57b2b46b94401a2ed2e3daabfbab14634d80152a4d4f3ce5e03808c246bb80d81c67781b5e445d436c54") bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={0x0, 0x3}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file2\x00', &(0x7f0000000640)='udf\x00', 0x341018, &(0x7f00000008c0)="ac7e3591ed0a61870f8245e7dcde88fd3c0cdb7d2751f7269a939b1a9add895f00b2e577678492b825dd4ad625df3b95ea27aba638699c63cd5fe99e5665d87a96b743e5b73ec1619e3ad66d7f7bd3f57d36232d3831ead1606450f158a84bcd1779c549388c") sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1f1ef037b3760767cd8c775fa395b6f8bd2d69edde61ea21ffe", 0x4b}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x28, &(0x7f00000001c0)}, 0x10) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) 2018/03/31 09:45:46 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x61, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:46 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0x7, 0xb6, &(0x7f0000000140)="227976ac0f08fd", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:46 executing program 0 (fault-call:18 fault-nth:40): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:46 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 287.245497] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 287.252737] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 287.259979] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 287.267219] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 287.274469] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000027 [ 287.451815] autofs4:pid:21879:autofs4_fill_super: called with bogus options [ 287.462937] hugetlbfs: Bad mount option: "" [ 287.485930] autofs4:pid:21887:autofs4_fill_super: called with bogus options [ 287.591302] FAULT_INJECTION: forcing a failure. [ 287.591302] name failslab, interval 1, probability 0, space 0, times 0 [ 287.602627] CPU: 0 PID: 21900 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 287.609894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.619237] Call Trace: [ 287.621806] dump_stack+0x194/0x24d [ 287.625414] ? arch_local_irq_restore+0x53/0x53 [ 287.630061] ? __save_stack_trace+0x7e/0xd0 [ 287.634371] should_fail+0x8c0/0xa40 [ 287.638065] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.643149] ? kasan_kmalloc+0xad/0xe0 [ 287.647019] ? kmem_cache_alloc_trace+0x136/0x740 [ 287.651842] ? __memcg_init_list_lru_node+0x169/0x270 [ 287.657008] ? __list_lru_init+0x544/0x750 [ 287.661226] ? sget_userns+0x6b1/0xe40 [ 287.665092] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 287.669825] ? do_mount+0xea4/0x2bb0 [ 287.673512] ? SyS_mount+0xab/0x120 [ 287.677122] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.682471] ? find_held_lock+0x35/0x1d0 [ 287.686520] ? __lock_is_held+0xb6/0x140 [ 287.690573] ? check_same_owner+0x320/0x320 [ 287.695257] ? rcu_note_context_switch+0x710/0x710 [ 287.700173] should_failslab+0xec/0x120 [ 287.704129] kmem_cache_alloc_trace+0x4b/0x740 [ 287.708687] ? __kmalloc_node+0x33/0x70 [ 287.712638] ? __kmalloc_node+0x33/0x70 [ 287.716590] ? rcu_read_lock_sched_held+0x108/0x120 [ 287.721589] __memcg_init_list_lru_node+0x169/0x270 [ 287.726587] ? list_lru_add+0x7c0/0x7c0 [ 287.730541] ? __kmalloc_node+0x47/0x70 [ 287.734500] __list_lru_init+0x544/0x750 [ 287.738547] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 287.744412] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 287.749413] ? lockdep_init_map+0x9/0x10 [ 287.753453] sget_userns+0x6b1/0xe40 [ 287.757141] ? set_anon_super+0x20/0x20 [ 287.761095] ? put_filp+0x90/0x90 [ 287.764529] ? destroy_unused_super.part.6+0xd0/0xd0 [ 287.769612] ? alloc_vfsmnt+0x762/0x9c0 [ 287.773562] ? path_lookupat+0x238/0xba0 [ 287.777602] ? mnt_free_id.isra.21+0x50/0x50 [ 287.781989] ? trace_hardirqs_off+0x10/0x10 [ 287.786294] ? putname+0xee/0x130 [ 287.789730] ? cap_capable+0x1b5/0x230 [ 287.793598] ? security_capable+0x8e/0xc0 [ 287.797747] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 287.802917] ? ns_capable_common+0xcf/0x160 [ 287.807219] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 287.812388] mount_ns+0x6d/0x190 [ 287.815738] rpc_mount+0x9e/0xd0 [ 287.819083] mount_fs+0x66/0x2d0 [ 287.822433] vfs_kern_mount.part.26+0xc6/0x4a0 [ 287.826993] ? may_umount+0xa0/0xa0 [ 287.830602] ? _raw_read_unlock+0x22/0x30 [ 287.834729] ? __get_fs_type+0x8a/0xc0 [ 287.838598] do_mount+0xea4/0x2bb0 [ 287.842114] ? __might_fault+0x110/0x1d0 [ 287.846157] ? copy_mount_string+0x40/0x40 [ 287.850373] ? __check_object_size+0x8b/0x530 [ 287.854853] ? __might_sleep+0x95/0x190 [ 287.858812] ? kasan_check_write+0x14/0x20 [ 287.863029] ? _copy_from_user+0x99/0x110 [ 287.867161] ? memdup_user+0x5e/0x90 [ 287.870850] ? copy_mount_options+0x1f7/0x2e0 [ 287.875327] SyS_mount+0xab/0x120 [ 287.878758] ? copy_mnt_ns+0xb30/0xb30 [ 287.882626] do_syscall_64+0x281/0x940 [ 287.886492] ? vmalloc_sync_all+0x30/0x30 [ 287.890621] ? _raw_spin_unlock_irq+0x27/0x70 [ 287.895094] ? finish_task_switch+0x1c1/0x7e0 [ 287.899570] ? syscall_return_slowpath+0x550/0x550 [ 287.904478] ? syscall_return_slowpath+0x2ac/0x550 [ 287.909392] ? prepare_exit_to_usermode+0x350/0x350 [ 287.914386] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 287.919729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.924557] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.929722] RIP: 0033:0x454e79 [ 287.932891] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:45:47 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000b00)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)='./file0\x00', &(0x7f0000000e40)='romfs\x00', 0x41, &(0x7f0000000e80)="4e37b2ed16590271910831cd912f22214ad6e97db6da562ff807ac3819f10fbe453f") mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r3 = gettid() bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b40)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000c80)={r2, &(0x7f0000000ec0)="f40bae747e1ba3cb441e1a6a5dac76e6dfe200053089a276dbc3af377622cd804805b48d182d0a5874825459f07a44faee74125dff92d88be42e81f32b303c68b682a36363bd1d2c79f2bc5d2841653894fbf180a480d15e5199a363a3ce51c54ed04dd95d872421d93f851c06e8c0c7c5639508d3ec4f2daa4d9356dcd2bcbe54b7c7da0000000967d2ad4cce3e654b505d538ad220a13b4d6421f865ac973ebaf4f103edc977401081136fd024f6469d2363ae5e6e7e98aa538f09969b62cd07b831e560b42954d6c985142f3e3a7ecf4a002df2f54dfb0bf9205320d3ec35cadb9872f3c880dc5733e892b4760c6217b11ed7b2"}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") perf_event_open(&(0x7f0000000bc0)={0x3, 0x70, 0x5, 0x9, 0x0, 0x80, 0x0, 0x140d, 0x4500, 0x3, 0xc01, 0x0, 0xa9d, 0xe2, 0xfffffffffffffc01, 0xfffffffffffffff8, 0xfffffffffffffff9, 0x9, 0x8db, 0x80000001, 0x0, 0xc00000000000, 0x100, 0xe0ce, 0x800, 0x6, 0x0, 0x9, 0x80000001, 0x0, 0x1, 0x4, 0x0, 0x2, 0x6, 0x4, 0xbf, 0xf5cf, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000b80), 0x1}, 0x0, 0x9, 0x7ff, 0x7, 0xfa, 0xe2, 0x1ff}, r3, 0x5, r0, 0x0) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000cc0)='ufs\x00', 0x4080, &(0x7f0000000d00)="b0ff212587d02107c216cccf85d8af68cd91f17db5a800ded9bd1a94ae44ebe74716200c92fc91c531cbfcf9c171bd916055d86989ff") mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a40)='./file0\x00', &(0x7f0000000d40)='nfsd\x00', 0x2004000, &(0x7f0000000d80)="dcd183239296034543abc390190940b5") 2018/03/31 09:45:47 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633") 2018/03/31 09:45:47 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x6, 0x1, 0x11}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x9, 0x5, 0x5, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000000ec0)={&(0x7f0000000b00)=@alg, 0xffffff18, &(0x7f0000000d80)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f0000000b80)=""/250, 0xfa}, {&(0x7f0000000c80)=""/174, 0xae}, {&(0x7f0000000d40)=""/36, 0x24}], 0x4, &(0x7f0000000dc0)=""/237, 0xed, 0x6}, 0x10000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00', r0}, 0x10) mkdir(&(0x7f0000000180)='./file0/file1\x00', 0x0) mount(&(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000f80)='./file0/file1\x00', &(0x7f0000000fc0)='befs\x00', 0x40, 0x0) mount(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='nilfs2\x00', 0x221002, &(0x7f0000000400)) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000240)='./file0/file1\x00', &(0x7f00000002c0)='tmpfs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000f00)) mount(&(0x7f0000000280)='./file0/file1\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000340)='configfs\x00', 0x44000, &(0x7f0000000380)) recvmsg(0xffffffffffffff9c, &(0x7f0000000200)={&(0x7f0000000680)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000700)=""/217, 0xd9}, {&(0x7f0000000800)=""/222, 0xde}, {&(0x7f0000000900)=""/181, 0xb5}], 0x3, &(0x7f00000009c0)=""/158, 0x9e, 0x10001}, 0x120) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x3, 0xa, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x1, 0xf, 0x1, 0x7, 0x70, 0xfffffffffffffffd}, @ldst={0x1, 0x3, 0x7, 0xf, 0xf, 0x100, 0x4}, @map={0x18, 0xa, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x26}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000080)='GPL\x00', 0x0, 0xca, &(0x7f0000000580)=""/202, 0x41100, 0x1, [], r2}, 0x48) 2018/03/31 09:45:47 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000c40)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)="66757e0f00", 0xa0080, &(0x7f0000000c80)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 0 (fault-call:18 fault-nth:41): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:47 executing program 4: r0 = gettid() socketpair(0x3, 0x8000a, 0x7f, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x9, 0x2, &(0x7f0000000040)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x9, 0x37, &(0x7f00000000c0)=""/55, 0x41100, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) recvmsg$kcm(r2, &(0x7f0000001640)={&(0x7f0000000180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/244, 0xf4}, {&(0x7f0000000300)=""/96, 0x60}, {&(0x7f0000000380)=""/200, 0xc8}, {&(0x7f0000000480)=""/214, 0xd6}, {&(0x7f0000000580)=""/31, 0x1f}], 0x5, &(0x7f0000000640)=""/4096, 0x1000, 0x9}, 0x0) sendmsg(r2, &(0x7f0000001b40)={&(0x7f0000001680)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e22, @multicast1=0xe0000001}, 0x3, 0x0, 0x1}}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001700)="7657b7f30842aab3675099ba610c4641af267a71cc3053b68a91002c8f63d7d91de7b8c1a284b3ef180962899754069420c160aacfb1cada49ed372d00f74336c5b453046b70e979c0c2d7e8ab9b626584dd3a44fc13ca24ea453a5198e63c8a7375793fe5ad7560e408924dab39a6c109fceed3ce14fc74c8fc1e18eeb7be0a91945067b9b3fa358574b570d725b211bdc17c2f147482edd5a6ba46459fe3562c98f1ca7739aa", 0xa7}, {&(0x7f00000017c0)="6e843bb67bae800f24b7b82313f609e2c2dce05f952bac42633ef071ce8ddef2ceda478a925063fd66a2be40fed1f0396195b656acecb20e9bb201288072f4042f2248822f8110c74fbad51c887ec5a84cd3ea7c23c38165aee7f95f6878eed88b9c8f0cf8ff14ce2eab918f03ced86285bec1eefd39b1e94d826811d4157b6f4e904f0afa7f4d89cb9a5899a83b24019ff5352e634ff6eb1bba", 0x9a}, {&(0x7f0000001880)="fc54410336c5987ef49649ff5c050d5a3edb65d2945444105bdd2634ad7ea9d6b28b120515ace7d0ce782995d5fc89c12b94513f6c06cf5a86b7ce1200238967692f9652525b1ecbd42e258e244d7544038a1f15c109a09783ccea7b5a244a8ffd13d953ae2150fd88849b95edfa8f044da72a446d640171daa9e7b1faf6181c74044fb22d8ff35925df6338abac7463fe3d839b053a40e56597a76d4d121088d88aa0536ed08b7d203db139f9ec31eedfd228d09fc6df4c527dde482570d01f73c43a115bb4a77ababcd1dcbbd9b758ac1e78ffcd70fc58d59dd65fee2d578e3bc25274ef43c65fd5c5a71486d666bd0a1b1141d56bcf7c", 0xf8}, {&(0x7f0000001980)="8bd1112e88635c6b575c00a9cce11086a2ceb710c0c43ebacbef9e1af0a7459b0d", 0x21}, {&(0x7f00000019c0)="4f0d4f04f142b56c4fb651569c8c4caf1f4ada2a6815a406423b4aa8a795114d979f0e741aad5ba1f69e23601bd78f73abf23a3143788489805b160e0af4d9e228b8e52e7c4ae2eca9b53bfae850c7b59e215e5922fe1e8d00b9373a12f7100f2ce03d79ae8c32d7ba0f3b179bb2e3a0cec52c18e8cd4bd0467eab182f70f8891366275d33c3f75075126697765568e97d27850ac560470eb4152a6177694a2bc3646b99a96c9754da7d5afbd38d03ffdd94e3157ca7fd", 0xb7}, {&(0x7f0000001a80)="133ca666ff341aab4b85e58a1046da14fb8ea9389a3c02ad6d565f2cfbb409a699724b87d342c688ffe72ffe1f41631eeefffedde9db8ce74a11e2", 0x3b}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000) sendmsg$kcm(r1, &(0x7f0000001d00)={&(0x7f0000001b80)=@in={0x2, 0x4e21}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001c00)="df101ddd54c8742d3db38a0885dacf18301ff0a6d86434554d36caf53161aca5314749991c4c51d62401735606f34a18a3ef8f7247ae4921fe4fac570950deef83f6c1934fde3631", 0x48}, {&(0x7f0000001c80)="19201dfe465e75d3ea6b2814cb74d187af", 0x11}], 0x2, 0x0, 0x0, 0x8040}, 0x4000081) gettid() close(r1) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001d40)) mount(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='./file0\x00', &(0x7f0000001e00)='bfs\x00', 0x1000, &(0x7f0000001e40)="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") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002e80)={r1, 0x28, &(0x7f0000002e40)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003000)={r2, &(0x7f0000002ec0)="dd204624c8267967399db5385c3e0d33d2334d238c614a2d355e1d24fb171bd601d386ed585403e1affc3da69c017b99312d8a26fc909bae41e317f9c8", &(0x7f0000002f00)=""/215}, 0x18) recvmsg$kcm(r2, &(0x7f0000003280)={&(0x7f0000003040), 0x80, &(0x7f00000031c0)=[{&(0x7f00000030c0)=""/247, 0xf7}], 0x1, &(0x7f0000003200)=""/93, 0x5d, 0x401}, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000003300)={&(0x7f00000032c0)='./file0\x00', r3}, 0x10) r5 = perf_event_open(&(0x7f0000003340)={0x0, 0x70, 0x1f, 0x8, 0x9, 0x80000001, 0x0, 0xffffffff, 0x8040, 0x1, 0x400, 0x5a, 0xffff, 0x1d, 0x40, 0x0, 0x481d80000000, 0xfff, 0x5, 0x0, 0x1, 0x200, 0x9, 0x0, 0x0, 0x7, 0x800, 0xd5, 0x8, 0x81, 0x400, 0xeab, 0xffffffffffff7fff, 0x7, 0x3f, 0xffff, 0x7, 0x1, 0x0, 0xe5, 0x2, @perf_config_ext={0x1, 0x8987}, 0xa002, 0xeef, 0xff, 0x7, 0x9, 0x5, 0x101}, r0, 0x4, r1, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000003540)={r2, &(0x7f00000033c0)="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", &(0x7f00000034c0)="f6f39a3ef13524c90b5f9877366ae4817f5dfdd8f15ea41a85083757f0fa7c3836bf4737fc35f73c1605b0bb3f170b34f5fe1c6f0b2929907048f9d045c82bcc18e70052534476d1964ba9e1b47592858868d363ca34999d8609fc697ca0e8e47d3d6ac5fa", 0x3}, 0x20) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x4) recvmsg(r3, &(0x7f00000039c0)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003580)=""/248, 0xf8}, {&(0x7f0000003680)=""/167, 0xa7}, {&(0x7f0000003740)=""/22, 0x16}, {&(0x7f0000003780)}, {&(0x7f00000037c0)=""/205, 0xcd}], 0x5, &(0x7f0000003940)=""/77, 0x4d, 0x4}, 0x20) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000003a00)={0xffffffffffffffff}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003b80)={r2, &(0x7f0000003a40)="2e571f287c0b84b956268992", &(0x7f0000003a80)=""/231}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000003d00)={r1, &(0x7f0000003bc0)="451f00f2c1581f7a0dba5739a72741f6decfe55df82411781f188e1b54c29d752c3f76b72c8fea52742da3bd7a3eee0346be6eb124e9219a3087890853e3b2fcfed2d5b196c8190e6fdf445fab7656ce4abf727d28bb73eb5e255b20d4d792507e165d7099f7ce4f89aa80fa4964c0e3516d18a00fd07d993ece781e382322a66caf1eeb1153fd757d93c77a9194405b499ac8db6cbe7145673d5ba65b1a8173cdcf67e4201e602c025ed158ee574e71c3be3336daaf23f92da374214d9ffb21177bcf9f346594aa24d472dc1ebbaac5e5341644506b69b3e9744334f32549e805ef35c2ca2d79250efc2fdb3360e303401381e9929bfbc8ab", &(0x7f0000003cc0)=""/56}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003d40)) perf_event_open(&(0x7f0000003dc0)={0x1, 0x70, 0x9, 0xffff, 0x4, 0x7, 0x0, 0x2000000, 0x10000, 0x4, 0xda, 0x7f, 0x1, 0x76dc, 0x9, 0xfffffffffffffffc, 0xff, 0x4, 0x1, 0x200, 0x100000000, 0xef1b, 0x7, 0x3, 0x7c2c4694, 0xa25e, 0x8, 0x1, 0x2, 0x2, 0x3, 0x80, 0x7fff, 0x0, 0xfffffffffffffff8, 0x3, 0x4, 0x4, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000003d80), 0x9}, 0x0, 0x677, 0x4, 0x7, 0xb952, 0x0, 0x4}, r0, 0x2, r5, 0xe5f79ed72483f9ec) socketpair$inet(0x2, 0x7, 0xc53, &(0x7f0000003e40)) gettid() setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000003e80)=r1, 0x4) perf_event_open(&(0x7f0000003ec0)={0x5, 0x70, 0x1, 0x5, 0x3f, 0x5, 0x0, 0x1, 0x60000, 0x2, 0x5, 0x3ff, 0x6, 0x0, 0x5, 0x7fff, 0x100000000, 0x5e6, 0x100, 0xffffffff, 0xa7, 0x4, 0x2, 0x80000001, 0x7, 0x800, 0x2, 0x6, 0x0, 0x2, 0x9, 0x1c06, 0x6, 0x1, 0x9, 0x100, 0x43d, 0x200, 0x0, 0xffffffffffff2fd6, 0x4, @perf_config_ext={0x1, 0x200}, 0x0, 0x211, 0x1, 0x0, 0x5, 0x36, 0x4}, r0, 0x6, r5, 0xa) bpf$PROG_LOAD(0x5, &(0x7f0000004fc0)={0xf, 0x7, &(0x7f0000003f40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7515}, [@jmp={0x5, 0x6, 0x5, 0xa, 0x9, 0xfffffffc, 0xfffffffffffffff0}, @map={0x18, 0x5, 0x1, 0x0, r1}], {0x95}}, &(0x7f0000003f80)='syzkaller\x00', 0x800, 0x1000, &(0x7f0000003fc0)=""/4096, 0x41100, 0x1, [], r4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000005080)={&(0x7f0000005040)='./file0\x00', r2}, 0x10) 2018/03/31 09:45:47 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xb, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c93683", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) [ 287.940580] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 287.947826] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 287.955076] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 287.962321] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 287.969569] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000028 2018/03/31 09:45:47 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633") 2018/03/31 09:45:47 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000640)) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000740)=""/16, 0x10}, {&(0x7f00000007c0)=""/177, 0xb1}, {&(0x7f0000000880)=""/74, 0x4a}, {&(0x7f0000000900)=""/119, 0x77}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/105, 0x69}], 0x6, &(0x7f0000001a80)=""/106, 0x6a, 0x2}, 0x40010000) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xa, 0x0, r1, 0x1}, 0x2c) mkdir(&(0x7f0000000000)='./file0/', 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000a780)={&(0x7f000000a500)=@hci={0x0, 0x0}, 0x80, &(0x7f000000a700)=[{&(0x7f000000a580)=""/171, 0xab}, {&(0x7f000000a640)=""/4, 0x4}, {&(0x7f000000a680)=""/107, 0x6b}], 0x3, &(0x7f000000a740)=""/58, 0x3a, 0x3ff}, 0x40002103) bpf$PROG_LOAD(0x5, &(0x7f000000a7c0)={0x8, 0x7, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0xaae}, [@jmp={0x5, 0xff, 0x0, 0x1, 0x7, 0x2}, @map={0x18, 0xf, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000000680)='GPL\x00', 0x1, 0x54, &(0x7f00000006c0)=""/84, 0x41100, 0x1, [], r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28, &(0x7f0000000200)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000440)='./file0\x00', 0x40) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/', 0x0, 0x10}, 0x10) r5 = perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x70000000, 0x2, 0x1, 0x3ff, 0x0, 0x80000000, 0x20120, 0x1, 0x1ff, 0x831, 0x9, 0x8, 0x5, 0x0, 0x95c, 0xffff, 0x553, 0x4, 0x40, 0x3, 0xf63, 0x0, 0x80000001, 0x9, 0x9, 0x9, 0x0, 0x6, 0x6, 0x836, 0x0, 0x6, 0x0, 0xd3e, 0x6, 0x6, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0x100000000}, 0x1, 0xfff, 0x100000000, 0x5, 0x7fffffff, 0x5, 0xafba}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0xc, 0x9, 0x1f, 0x7f, 0x0, r1, 0x2}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000600)={&(0x7f0000000500)='./file0\x00', 0x0, 0x8}, 0xfffffde8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000280)={r4, 0x30, 0x18}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x2, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x1, 0xd, 0xee57c97b4ef6f0c5, 0x7, 0x0, 0xfffffffffffffff0}], &(0x7f0000000300)='GPL\x00', 0x0, 0x6a, &(0x7f0000000340)=""/106, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:47 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000ac0)={&(0x7f0000000a80)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x83, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) [ 288.279527] FAULT_INJECTION: forcing a failure. [ 288.279527] name failslab, interval 1, probability 0, space 0, times 0 [ 288.290883] CPU: 0 PID: 21939 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 288.298158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.307506] Call Trace: [ 288.310091] dump_stack+0x194/0x24d [ 288.313718] ? arch_local_irq_restore+0x53/0x53 [ 288.318383] ? __save_stack_trace+0x7e/0xd0 [ 288.322700] should_fail+0x8c0/0xa40 2018/03/31 09:45:47 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f310") [ 288.326412] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.331504] ? kasan_kmalloc+0xad/0xe0 [ 288.335380] ? kmem_cache_alloc_trace+0x136/0x740 [ 288.340216] ? __memcg_init_list_lru_node+0x169/0x270 [ 288.345399] ? __list_lru_init+0x544/0x750 [ 288.349617] ? sget_userns+0x6b1/0xe40 [ 288.353490] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 288.358227] ? do_mount+0xea4/0x2bb0 [ 288.361918] ? SyS_mount+0xab/0x120 [ 288.365536] ? do_syscall_64+0x281/0x940 [ 288.369581] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.374924] ? find_held_lock+0x35/0x1d0 [ 288.378975] ? __lock_is_held+0xb6/0x140 [ 288.383036] ? check_same_owner+0x320/0x320 [ 288.387352] ? rcu_note_context_switch+0x710/0x710 [ 288.392273] should_failslab+0xec/0x120 [ 288.396246] kmem_cache_alloc_trace+0x4b/0x740 [ 288.400819] ? __kmalloc_node+0x33/0x70 [ 288.404778] ? __kmalloc_node+0x33/0x70 [ 288.408742] ? rcu_read_lock_sched_held+0x108/0x120 [ 288.413757] __memcg_init_list_lru_node+0x169/0x270 [ 288.418757] ? list_lru_add+0x7c0/0x7c0 [ 288.422716] ? __kmalloc_node+0x47/0x70 [ 288.426687] __list_lru_init+0x544/0x750 [ 288.430740] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 288.436610] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 288.441606] ? lockdep_init_map+0x9/0x10 [ 288.445643] sget_userns+0x6b1/0xe40 [ 288.449331] ? set_anon_super+0x20/0x20 [ 288.453279] ? put_filp+0x90/0x90 [ 288.456710] ? destroy_unused_super.part.6+0xd0/0xd0 [ 288.461797] ? alloc_vfsmnt+0x762/0x9c0 [ 288.465762] ? path_lookupat+0x238/0xba0 [ 288.469805] ? mnt_free_id.isra.21+0x50/0x50 [ 288.474210] ? trace_hardirqs_off+0x10/0x10 [ 288.478518] ? putname+0xee/0x130 [ 288.481957] ? cap_capable+0x1b5/0x230 [ 288.485831] ? security_capable+0x8e/0xc0 [ 288.489959] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 288.495134] ? ns_capable_common+0xcf/0x160 [ 288.499432] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 288.504601] mount_ns+0x6d/0x190 [ 288.507945] rpc_mount+0x9e/0xd0 [ 288.511286] mount_fs+0x66/0x2d0 [ 288.514628] vfs_kern_mount.part.26+0xc6/0x4a0 [ 288.519201] ? may_umount+0xa0/0xa0 [ 288.522811] ? _raw_read_unlock+0x22/0x30 [ 288.526943] ? __get_fs_type+0x8a/0xc0 [ 288.530815] do_mount+0xea4/0x2bb0 [ 288.534336] ? __might_fault+0x110/0x1d0 [ 288.538381] ? copy_mount_string+0x40/0x40 [ 288.542588] ? check_same_owner+0x320/0x320 [ 288.546887] ? __check_object_size+0x8b/0x530 [ 288.551360] ? __might_sleep+0x95/0x190 [ 288.555320] ? kasan_check_write+0x14/0x20 [ 288.559546] ? _copy_from_user+0x99/0x110 [ 288.563679] ? memdup_user+0x5e/0x90 [ 288.567372] ? copy_mount_options+0x1f7/0x2e0 [ 288.571855] SyS_mount+0xab/0x120 [ 288.575292] ? copy_mnt_ns+0xb30/0xb30 [ 288.579171] do_syscall_64+0x281/0x940 [ 288.583047] ? vmalloc_sync_all+0x30/0x30 [ 288.587174] ? _raw_spin_unlock_irq+0x27/0x70 [ 288.591645] ? finish_task_switch+0x1c1/0x7e0 [ 288.596122] ? syscall_return_slowpath+0x550/0x550 [ 288.601041] ? syscall_return_slowpath+0x2ac/0x550 [ 288.605953] ? prepare_exit_to_usermode+0x350/0x350 [ 288.610948] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 288.616301] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.621130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.626294] RIP: 0033:0x454e79 [ 288.629457] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 288.637143] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 288.644395] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 288.651646] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 288.658888] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 288.666133] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000029 2018/03/31 09:45:47 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000b00)={&(0x7f0000000ac0)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000b40)={&(0x7f0000000a80)='./file0\x00', r2}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000b80)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r2 = gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) perf_event_open(&(0x7f0000000a40)={0x4, 0x70, 0x8, 0x10001, 0x1, 0x1, 0x0, 0x4, 0x810, 0x4, 0xffffffff, 0x9, 0x448d, 0x1, 0x9, 0xffffffff, 0x1, 0xfffffffffffffff9, 0x3, 0x1f, 0x3f, 0xf29, 0x8, 0xffffffff, 0x3, 0xbec4, 0x8, 0x4, 0x9, 0x10001, 0x733f726a, 0x0, 0x7fff, 0x1, 0x7, 0x3, 0x2, 0x2, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000640), 0x3}, 0x10, 0x10000, 0x9, 0x2, 0x80000001, 0x2, 0x30000000}, r2, 0x6, r0, 0x9) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') getpid() sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) close(r4) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x5) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:47 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xb, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c93683", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:47 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f310") 2018/03/31 09:45:47 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xeca, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/03/31 09:45:47 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file1\x00', 0x0, 0x10}, 0x10) mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x9, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001080)=ANY=[@ANYBLOB="01e100000000000000d6000000c4b6b9c42c2714ccb95e6993e93b1919beb3eb1557022b2dad73a7a2c9489419fabba84fc9872636ddcb0cdc984aaffb76bc56b23000000000000300"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file0\x00', 0x0, 0x18}, 0x10000056e) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r1}, 0x10) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0x1000}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r2}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a00)={&(0x7f0000001180)='./file0\x00', 0x0, 0x8}, 0xffffffffffffff58) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000ec0)={0x6, 0xfffffffffffffff0, 0x4, 0xef, 0x2, 0xffffffffffffffff, 0x7ff}, 0x2c) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=ANY=[@ANYBLOB="c0000000000000002b010000010000007f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aed9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63bcd27374843eef5035c1fbea30c138f89857d86a7e380000"], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") 2018/03/31 09:45:47 executing program 0 (fault-call:18 fault-nth:42): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) [ 288.994380] FAULT_INJECTION: forcing a failure. [ 288.994380] name failslab, interval 1, probability 0, space 0, times 0 [ 289.005736] CPU: 1 PID: 21976 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 289.013012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.022363] Call Trace: [ 289.024955] dump_stack+0x194/0x24d [ 289.028586] ? arch_local_irq_restore+0x53/0x53 [ 289.033251] ? __save_stack_trace+0x7e/0xd0 [ 289.037574] should_fail+0x8c0/0xa40 [ 289.041270] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.046350] ? kasan_kmalloc+0xad/0xe0 [ 289.050217] ? kmem_cache_alloc_trace+0x136/0x740 [ 289.055041] ? __memcg_init_list_lru_node+0x169/0x270 [ 289.060206] ? __list_lru_init+0x544/0x750 [ 289.064514] ? sget_userns+0x6b1/0xe40 [ 289.068382] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.073115] ? do_mount+0xea4/0x2bb0 [ 289.076805] ? SyS_mount+0xab/0x120 [ 289.080411] ? do_syscall_64+0x281/0x940 [ 289.084453] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.089803] ? find_held_lock+0x35/0x1d0 [ 289.093850] ? __lock_is_held+0xb6/0x140 [ 289.097904] ? check_same_owner+0x320/0x320 [ 289.102207] ? rcu_note_context_switch+0x710/0x710 [ 289.107125] should_failslab+0xec/0x120 [ 289.111082] kmem_cache_alloc_trace+0x4b/0x740 [ 289.115643] ? __kmalloc_node+0x33/0x70 [ 289.119594] ? __kmalloc_node+0x33/0x70 [ 289.123546] ? rcu_read_lock_sched_held+0x108/0x120 [ 289.128545] __memcg_init_list_lru_node+0x169/0x270 [ 289.133543] ? list_lru_add+0x7c0/0x7c0 [ 289.137501] ? __kmalloc_node+0x47/0x70 [ 289.141459] __list_lru_init+0x544/0x750 [ 289.145505] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 289.151369] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 289.156373] ? lockdep_init_map+0x9/0x10 [ 289.160416] sget_userns+0x6b1/0xe40 [ 289.164105] ? set_anon_super+0x20/0x20 [ 289.168059] ? put_filp+0x90/0x90 [ 289.171491] ? destroy_unused_super.part.6+0xd0/0xd0 [ 289.176575] ? alloc_vfsmnt+0x762/0x9c0 [ 289.180527] ? path_lookupat+0x238/0xba0 [ 289.184567] ? mnt_free_id.isra.21+0x50/0x50 [ 289.188955] ? trace_hardirqs_off+0x10/0x10 [ 289.193258] ? putname+0xee/0x130 [ 289.196692] ? cap_capable+0x1b5/0x230 [ 289.200562] ? security_capable+0x8e/0xc0 [ 289.204692] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.209860] ? ns_capable_common+0xcf/0x160 [ 289.214164] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.219333] mount_ns+0x6d/0x190 [ 289.222680] rpc_mount+0x9e/0xd0 [ 289.226030] mount_fs+0x66/0x2d0 [ 289.229379] vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.233940] ? may_umount+0xa0/0xa0 [ 289.237544] ? _raw_read_unlock+0x22/0x30 [ 289.241668] ? __get_fs_type+0x8a/0xc0 [ 289.245535] do_mount+0xea4/0x2bb0 [ 289.249053] ? __might_fault+0x110/0x1d0 [ 289.253099] ? copy_mount_string+0x40/0x40 [ 289.257316] ? check_same_owner+0x320/0x320 [ 289.261617] ? __check_object_size+0x8b/0x530 [ 289.266096] ? __might_sleep+0x95/0x190 [ 289.270059] ? kasan_check_write+0x14/0x20 [ 289.274278] ? _copy_from_user+0x99/0x110 [ 289.278408] ? memdup_user+0x5e/0x90 [ 289.282100] ? copy_mount_options+0x1f7/0x2e0 [ 289.286576] SyS_mount+0xab/0x120 [ 289.290008] ? copy_mnt_ns+0xb30/0xb30 [ 289.293885] do_syscall_64+0x281/0x940 [ 289.297749] ? vmalloc_sync_all+0x30/0x30 [ 289.301875] ? _raw_spin_unlock_irq+0x27/0x70 [ 289.306352] ? finish_task_switch+0x1c1/0x7e0 [ 289.310824] ? syscall_return_slowpath+0x550/0x550 [ 289.315734] ? syscall_return_slowpath+0x2ac/0x550 [ 289.320642] ? prepare_exit_to_usermode+0x350/0x350 [ 289.325637] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 289.330983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.335809] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.340978] RIP: 0033:0x454e79 2018/03/31 09:45:48 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:48 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x2, 0x936b, 0x800, 0x10, 0xffffffffffffff9c, 0x20}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000a80)={r1, &(0x7f0000000a40)="bc6cfd3746000bc8458d9f3413d805ef938b1b89e8de940eb9900ce65178342350429567c55a9e58aaee373507c1d72034922ffa83f1bd26ed666651caa6"}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23785da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c484b73293eb33a1fb3246af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r2, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)={0xf, 0x4, 0x7, 0xd7, 0x10, r3, 0x0, [0x115]}, 0xe791) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 2018/03/31 09:45:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xc, 0x4, 0x4, 0x100000001, 0x0, r1}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000200)='./file1\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x22, &(0x7f0000000100)=""/34}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{0x18}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}], {0x95}}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225, 0x41f00}, 0x13) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r3, 0x33, &(0x7f0000000140)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000280)={r3, 0x50, &(0x7f0000000140)}, 0x10) r4 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x3) r5 = getpid() perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x3, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x200, 0x0, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x0, 0x0, 0x401f, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r5, 0x1, 0xffffffffffffffff, 0xa) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r2, &(0x7f0000000700)="a606797262eab3cc5720f712fba80227b33e196609ba0ea3ec95aaf760e20b484f6bb59bead216e2450fd8de9160849de413924055ffd492927f3fb8840c01a978fa20c3795f4991d32c4f95acb71bb03d580b2c444f56116e118ecb2ba88feb7005179053127fd78d5df8dc915e30cf4b18f7a723ebd5ec9df227aefdbd337f55deab09ce6763974152", &(0x7f0000000540)=""/238}, 0x18) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file0\x00', 0x0, 0x10}, 0x10) [ 289.344147] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.351834] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 289.359083] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 289.366330] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 289.373577] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 289.380832] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002a 2018/03/31 09:45:48 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000c00)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='ecryptfs\x00', 0x208000, &(0x7f0000000b40)="351946171a7660c9f3c54de95de18a1225c1949361a1f4571589459db81a7aba53a5da9ac10974797ab46df20fcfaa3aa475c41fa8caaf04074cf976e2389ee9e31b2d8d6a9bbe1a8afb6bfca3c81017eac2227db7ac35ac4dd66908cae223e4960327bb87d1f19c6499c8a9cd79d2ea5198ac6dd564dfe85bfa95290ec731114a3e010f32112069109290bced615dcb3307e2a3760f583bad5294ffb09873db71fe1f8852aface0") bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:48 executing program 0 (fault-call:18 fault-nth:43): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:48 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f310") 2018/03/31 09:45:48 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xb, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c93683", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:48 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:48 executing program 4: perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x6, 0x4, 0x40, 0x0, 0x1}, 0xb9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000080)="69b092a99177a5457abeba564c498aae1959822feb29355d9ba0cdb3164f219a68edbdb6bbd1f55d", &(0x7f00000000c0)="281c146bb4e00af487177a163bfd209ec5d575603e696b9eb9cd21f3b1880ce6b8da2bcb3d58361ddde17615bd7e74ba52ca69adf4701e634ee82d49666b5fc2b905da300f4d0d63ce666f305c9d96365165fa9466383c2893693c25a66e"}, 0x20) close(r0) socketpair$inet(0x2, 0x0, 0x2, &(0x7f00000001c0)) socketpair(0xa, 0x80801, 0x8001, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f00000008c0)={&(0x7f0000000200)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)}, {&(0x7f00000002c0)=""/33, 0x21}, {&(0x7f0000000300)=""/251, 0xfb}, {&(0x7f0000000400)=""/138, 0x8a}, {&(0x7f00000004c0)=""/56, 0x38}, {&(0x7f0000000500)=""/11, 0xb}, {&(0x7f0000000540)=""/209, 0xd1}, {&(0x7f0000000640)=""/230, 0xe6}, {&(0x7f0000000740)=""/2, 0x2}], 0x9, &(0x7f0000000840)=""/70, 0x46, 0x4}, 0x40) [ 289.596315] FAULT_INJECTION: forcing a failure. [ 289.596315] name failslab, interval 1, probability 0, space 0, times 0 [ 289.607603] CPU: 1 PID: 22004 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 289.614878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.624225] Call Trace: [ 289.626815] dump_stack+0x194/0x24d [ 289.630447] ? arch_local_irq_restore+0x53/0x53 [ 289.635114] ? __save_stack_trace+0x7e/0xd0 [ 289.639434] should_fail+0x8c0/0xa40 [ 289.643137] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.648229] ? kasan_kmalloc+0xad/0xe0 [ 289.652101] ? kmem_cache_alloc_trace+0x136/0x740 [ 289.656924] ? __memcg_init_list_lru_node+0x169/0x270 [ 289.662091] ? __list_lru_init+0x544/0x750 [ 289.666307] ? sget_userns+0x6b1/0xe40 [ 289.670178] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.674911] ? do_mount+0xea4/0x2bb0 [ 289.678601] ? SyS_mount+0xab/0x120 [ 289.682207] ? do_syscall_64+0x281/0x940 [ 289.686247] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.691596] ? find_held_lock+0x35/0x1d0 [ 289.695653] ? __lock_is_held+0xb6/0x140 [ 289.699707] ? check_same_owner+0x320/0x320 [ 289.704023] ? rcu_note_context_switch+0x710/0x710 [ 289.708942] should_failslab+0xec/0x120 [ 289.712897] kmem_cache_alloc_trace+0x4b/0x740 [ 289.717461] ? __kmalloc_node+0x33/0x70 [ 289.721413] ? __kmalloc_node+0x33/0x70 [ 289.725364] ? rcu_read_lock_sched_held+0x108/0x120 [ 289.730368] __memcg_init_list_lru_node+0x169/0x270 [ 289.735366] ? list_lru_add+0x7c0/0x7c0 [ 289.739318] ? __kmalloc_node+0x47/0x70 [ 289.743279] __list_lru_init+0x544/0x750 [ 289.747328] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 289.753193] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 289.758197] ? lockdep_init_map+0x9/0x10 [ 289.762244] sget_userns+0x6b1/0xe40 [ 289.765935] ? set_anon_super+0x20/0x20 [ 289.769892] ? put_filp+0x90/0x90 [ 289.773326] ? destroy_unused_super.part.6+0xd0/0xd0 [ 289.778410] ? alloc_vfsmnt+0x762/0x9c0 [ 289.782363] ? path_lookupat+0x238/0xba0 [ 289.786406] ? mnt_free_id.isra.21+0x50/0x50 [ 289.790798] ? trace_hardirqs_off+0x10/0x10 [ 289.795102] ? putname+0xee/0x130 [ 289.798540] ? cap_capable+0x1b5/0x230 [ 289.802411] ? security_capable+0x8e/0xc0 [ 289.806542] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.811712] ? ns_capable_common+0xcf/0x160 [ 289.816026] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.821202] mount_ns+0x6d/0x190 [ 289.824553] rpc_mount+0x9e/0xd0 [ 289.827902] mount_fs+0x66/0x2d0 [ 289.831260] vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.835822] ? may_umount+0xa0/0xa0 [ 289.839430] ? _raw_read_unlock+0x22/0x30 [ 289.843560] ? __get_fs_type+0x8a/0xc0 [ 289.847436] do_mount+0xea4/0x2bb0 [ 289.850955] ? __might_fault+0x110/0x1d0 [ 289.855003] ? copy_mount_string+0x40/0x40 [ 289.859225] ? check_same_owner+0x320/0x320 [ 289.863533] ? __check_object_size+0x8b/0x530 [ 289.868019] ? __might_sleep+0x95/0x190 [ 289.871984] ? kasan_check_write+0x14/0x20 [ 289.876202] ? _copy_from_user+0x99/0x110 [ 289.880334] ? memdup_user+0x5e/0x90 [ 289.884031] ? copy_mount_options+0x1f7/0x2e0 [ 289.888513] SyS_mount+0xab/0x120 [ 289.891946] ? copy_mnt_ns+0xb30/0xb30 [ 289.895815] do_syscall_64+0x281/0x940 [ 289.899682] ? vmalloc_sync_all+0x30/0x30 [ 289.903808] ? _raw_spin_unlock_irq+0x27/0x70 [ 289.908287] ? finish_task_switch+0x1c1/0x7e0 [ 289.912763] ? syscall_return_slowpath+0x550/0x550 [ 289.917675] ? syscall_return_slowpath+0x2ac/0x550 [ 289.922583] ? prepare_exit_to_usermode+0x350/0x350 [ 289.927587] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 289.932937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.937762] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.942929] RIP: 0033:0x454e79 2018/03/31 09:45:49 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050a") 2018/03/31 09:45:49 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") r1 = getpid() perf_event_open(&(0x7f0000000a40)={0x5, 0x70, 0xffffffff, 0x7, 0x3, 0x0, 0x0, 0xff, 0x1008, 0xa, 0x9, 0x2, 0x4b2d, 0xfffffffffffff61e, 0x4, 0x555, 0x100, 0x8, 0x7, 0x7fffffff, 0xffff, 0x2d, 0x8001, 0x7f, 0xfff, 0xf2db, 0x8, 0x7, 0x9, 0xfffffffeffffffff, 0x6, 0x3, 0xb81, 0x3ff, 0x8, 0x100, 0x4, 0x7fffffff0, 0x0, 0x80000000, 0x4, @perf_bp={&(0x7f0000000640), 0xc}, 0x22000, 0x3, 0x9, 0x7, 0x401, 0x5, 0x8}, r1, 0xa, r0, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)={0xa, 0x5, 0x36b, 0x3, 0x9ef339f1e8ac7d5, 0xffffffffffffff9c, 0xb6a}, 0x2c) recvmsg$kcm(0xffffffffffffffff, &(0x7f000000b740)={&(0x7f000000b500)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f000000b680)=[{&(0x7f000000b580)=""/143, 0x8f}, {&(0x7f000000b640)=""/36, 0x24}], 0x2, &(0x7f000000b6c0)=""/97, 0x61, 0x9}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f000000b780)={0xf, 0x6, &(0x7f0000000b00)=@raw=[@call={0x85, 0x0, 0x0, 0x3}, @map={0x18, 0xf, 0x1, 0x0, r2}, @ldst={0x3, 0x1, 0x6, 0x7, 0x9, 0xfffffff8, 0x1}], &(0x7f0000000b40)='syzkaller\x00', 0x3, 0xc8, &(0x7f0000000b80)=""/200, 0x41f00, 0x0, [], r3}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r4, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() getpid() socketpair(0x11, 0x800, 0x69, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r5, &(0x7f00000012c0)={&(0x7f0000001140)=@nl=@proc, 0x80, &(0x7f00000011c0), 0x0, &(0x7f0000001200)=""/178, 0xb2, 0x5}, 0x42) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r6, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r6}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 289.946096] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.953787] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 289.961040] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 289.968289] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 289.975537] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 289.982786] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002b 2018/03/31 09:45:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="8500001022000000070000007b0700397000000000000000"], &(0x7f0000000480)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d811248901009d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e00896775d07e643294f42572c5c6afe73b327c265d3da17b9b836403a9848ed53b6a03675e3abe7fcbcc7f7e3e20a3247b3140d507ce0cac979cd37dc2fb7f0a6f3047c62b2b38196e9f5720f37c75293d4397af", 0x1, 0x99, &(0x7f000000d000)=""/153}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r0, 0x0, 0x36, 0x1000, &(0x7f0000000300)="288b6671d7af52f647750500080089ea0000000000005f2f66ad8769233d85c111af0daba4829a55bc8f7b5ed4af5022698dfc91ffd7", &(0x7f0000000800)=""/4096}, 0x28) r1 = getpid() r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x5, 0x1, 0x3, 0x2, 0x0, 0x8, 0x3c466eac984d93fc, 0x4, 0x4, 0x100, 0x9857, 0x800, 0xfffffffffffffffc, 0x1, 0x20, 0x9, 0x9, 0x2, 0x10000, 0x7dc756ec, 0x20, 0x3f, 0xfffffffffffffffe, 0x344, 0x3, 0x5f7700000000, 0x1ff, 0xffffffffffffff03, 0x7, 0x1f, 0x7fff, 0x3, 0x0, 0x594, 0x5, 0x6, 0x0, 0x1, 0x2, @perf_config_ext={0xffffffffffffff00, 0xefc}, 0x2, 0x81, 0x8000, 0x7, 0x1, 0x0, 0x100000001}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x4fe6, 0x20, 0x4936, 0xdbd1, 0x0, 0x0, 0x2, 0xa, 0x6, 0x10001, 0x7fff, 0x9, 0x2dc9, 0x7, 0x7ff, 0x81, 0x4, 0x9, 0x7fffffff, 0x2, 0x5144965, 0x4, 0xc4f, 0x4, 0x2, 0x400, 0xfffffffffffffffd, 0x4, 0xfffffffffffffffa, 0x7, 0x5, 0x480, 0x182, 0x3f, 0x1ff, 0x100000001, 0x0, 0x8, 0x4, @perf_config_ext={0x6, 0x5}, 0x22, 0x10000, 0x1, 0x7, 0x0, 0xfffffffffffffff7, 0xffffffff}, r1, 0xd, r2, 0xb) 2018/03/31 09:45:49 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000b80)='openpromfs\x00', 0x800000, &(0x7f0000000a80)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:49 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xd, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:49 executing program 0 (fault-call:18 fault-nth:44): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:49 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef5") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:49 executing program 2: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca757", 0x1f}], 0x1, &(0x7f0000000980)}, 0x20000000) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba02ed5166be56df09fec2eef35318bf9b1", &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x401, 0x4, 0x2, 0x8}, @exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff}) mkdir(&(0x7f0000000ac0)='./file1\x00', 0x40) mkdir(&(0x7f0000000b00)='./file0\x00', 0x4) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x1) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x103fe, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) recvmsg(r0, &(0x7f0000003c40)={&(0x7f0000001500)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000001580)=""/187, 0xbb}, {&(0x7f0000001640)=""/202, 0xca}, {&(0x7f0000001740)=""/97, 0x61}, {&(0x7f00000017c0)=""/142, 0x8e}, {&(0x7f00000029c0)=""/172, 0xac}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/144, 0x90}, {&(0x7f0000003b40)=""/111, 0x6f}], 0x8, 0x0, 0x0, 0x800}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000003c80)={0xe, 0x9, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@generic={0x10001, 0x9, 0x0, 0x3}, @ldst={0x3, 0x3, 0x7, 0x0, 0x8, 0x0, 0x8}, @generic={0x0, 0x1ff, 0x623c7a4d, 0x6006730a}], {0x95}}, &(0x7f0000000980)='GPL\x00', 0x5, 0x84, &(0x7f00000009c0)=""/132, 0x0, 0x0, [], r3}, 0x48) mkdir(&(0x7f0000000a80)='./file0\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r1}, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x10, &(0x7f00000004c0)=@raw=[@exit={0x95}, @jmp={0x5, 0x7f, 0x9, 0x7, 0x0, 0x30, 0x570c72d2c4205df9}, @generic={0x0, 0xffffffffffffffc1, 0x8, 0x1}, @ldst={0x1, 0x2, 0x34194f12a387f72c, 0x2, 0x3, 0xfffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x18}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000380)='syzkaller\x00', 0x7fff, 0xd, &(0x7f0000000580)=""/13, 0x40f00, 0x1}, 0x48) recvmsg(r2, &(0x7f0000000540)={&(0x7f0000000b80)=@pppoe={0x0, 0x0, {0x0, @broadcast}}, 0x80, &(0x7f0000001480)=[{&(0x7f0000000080)=""/16, 0x10}, {&(0x7f0000000d40)=""/229, 0xe5}, {&(0x7f0000000c00)=""/94, 0x5e}, {&(0x7f0000001300)=""/209, 0xd1}, {&(0x7f0000001400)=""/108, 0x6c}], 0x5, &(0x7f00000019c0)=""/101, 0x65, 0xfffffffffffffffd}, 0x12040) recvmsg(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000000e40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000c80)=""/21, 0x15}, {&(0x7f0000000ec0)=""/105, 0x69}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/5, 0x5}, {&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/204, 0xcc}], 0x6, &(0x7f0000001200)=""/43, 0x2b, 0x6}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0xf, 0xb, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0xffffffffffffff00}, [@ldst={0x3, 0x0, 0x6, 0xf, 0x7, 0xfffffff8, 0xfffffffffffffff0}, @exit={0x95}, @jmp={0x5, 0x0, 0x7, 0xf, 0x1, 0xfffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}], {0x95}}, &(0x7f0000000680)='syzkaller\x00', 0x304f, 0x41, &(0x7f0000000880)=""/65, 0x41100, 0x1, [], r4}, 0x48) 2018/03/31 09:45:49 executing program 6: perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r0, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r1, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) r2 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x3) r4 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x2, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x0, 0x0, 0x0, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r4, 0x1, r3, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) r5 = perf_event_open(&(0x7f000000a000)={0x2, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) close(r5) mount(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2\x00', 0x800400, &(0x7f0000000240)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") close(r3) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000900)={0xffffffffffffff9c}) sendmsg$kcm(r6, &(0x7f0000009f00)={&(0x7f0000009b80)=@ll={0x11, 0x18, 0x0, 0x1, 0xffe0000000000000, 0x6, @random="434de4d182c8"}, 0x80, &(0x7f0000009c00), 0x0, &(0x7f0000009c40)=ANY=[], 0x0, 0x4000000}, 0x4000000) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000002c0)={r6}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000d40)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) sendmsg(r8, &(0x7f0000000140)={&(0x7f00000002c0)=@sco={0x1f, {0x4, 0x6a3a, 0x99, 0xffffffffffffcd58, 0xff, 0xffffffffffffffaf}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)="ebf2716387a78e98475956706ceecf4f691f0f64dfb2736aae935b7f8c8b4824eb0b99059de5958ea0fb81ea850657c27b1293c19343b34143d83d1c2ae986fab57bbc85c6b9f4fb2abb4d7cd4503b6455489b7ccbdf8e1be0183f09f69903b360c991de52fccfa2d9af45809b0eaa0ac1e9e2729078c6641c6ed2a4912937863e68512e66c8d19ae995af630d97", 0x8e}], 0x1, &(0x7f00000004c0), 0x0, 0x4000}, 0x4884) 2018/03/31 09:45:49 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050a") 2018/03/31 09:45:49 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050a") [ 290.409540] FAULT_INJECTION: forcing a failure. [ 290.409540] name failslab, interval 1, probability 0, space 0, times 0 [ 290.420881] CPU: 0 PID: 22050 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 290.428163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.437515] Call Trace: [ 290.440091] dump_stack+0x194/0x24d [ 290.443701] ? arch_local_irq_restore+0x53/0x53 [ 290.448347] ? __save_stack_trace+0x7e/0xd0 [ 290.452658] should_fail+0x8c0/0xa40 [ 290.456355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.461441] ? kasan_kmalloc+0xad/0xe0 [ 290.465307] ? kmem_cache_alloc_trace+0x136/0x740 [ 290.470130] ? __memcg_init_list_lru_node+0x169/0x270 [ 290.475299] ? __list_lru_init+0x544/0x750 [ 290.479513] ? sget_userns+0x6b1/0xe40 [ 290.483383] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 290.488115] ? do_mount+0xea4/0x2bb0 [ 290.491808] ? SyS_mount+0xab/0x120 [ 290.495419] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.500769] ? find_held_lock+0x35/0x1d0 [ 290.504815] ? __lock_is_held+0xb6/0x140 [ 290.508869] ? check_same_owner+0x320/0x320 [ 290.513174] ? rcu_note_context_switch+0x710/0x710 [ 290.518087] should_failslab+0xec/0x120 [ 290.522043] kmem_cache_alloc_trace+0x4b/0x740 [ 290.526623] ? __kmalloc_node+0x33/0x70 [ 290.530586] __memcg_init_list_lru_node+0x169/0x270 [ 290.535586] ? list_lru_add+0x7c0/0x7c0 [ 290.539539] ? __kmalloc_node+0x47/0x70 [ 290.543500] __list_lru_init+0x544/0x750 [ 290.547543] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 290.553407] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 290.558410] ? lockdep_init_map+0x9/0x10 [ 290.562454] sget_userns+0x6b1/0xe40 [ 290.566148] ? set_anon_super+0x20/0x20 [ 290.570106] ? put_filp+0x90/0x90 [ 290.573538] ? destroy_unused_super.part.6+0xd0/0xd0 [ 290.578619] ? alloc_vfsmnt+0x762/0x9c0 [ 290.582571] ? path_lookupat+0x238/0xba0 [ 290.586609] ? mnt_free_id.isra.21+0x50/0x50 [ 290.590999] ? trace_hardirqs_off+0x10/0x10 [ 290.595309] ? putname+0xee/0x130 [ 290.598745] ? cap_capable+0x1b5/0x230 [ 290.602615] ? security_capable+0x8e/0xc0 [ 290.606746] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 290.611918] ? ns_capable_common+0xcf/0x160 [ 290.616226] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 290.621409] mount_ns+0x6d/0x190 [ 290.624758] rpc_mount+0x9e/0xd0 [ 290.628106] mount_fs+0x66/0x2d0 [ 290.631455] vfs_kern_mount.part.26+0xc6/0x4a0 [ 290.636020] ? may_umount+0xa0/0xa0 [ 290.639632] ? _raw_read_unlock+0x22/0x30 [ 290.643759] ? __get_fs_type+0x8a/0xc0 [ 290.647630] do_mount+0xea4/0x2bb0 [ 290.651151] ? __might_fault+0x110/0x1d0 [ 290.655199] ? copy_mount_string+0x40/0x40 [ 290.659415] ? __check_object_size+0x8b/0x530 [ 290.663898] ? __might_sleep+0x95/0x190 [ 290.667859] ? kasan_check_write+0x14/0x20 [ 290.672077] ? _copy_from_user+0x99/0x110 [ 290.676209] ? memdup_user+0x5e/0x90 [ 290.679902] ? copy_mount_options+0x1f7/0x2e0 [ 290.684382] SyS_mount+0xab/0x120 [ 290.687817] ? copy_mnt_ns+0xb30/0xb30 [ 290.691686] do_syscall_64+0x281/0x940 [ 290.695553] ? vmalloc_sync_all+0x30/0x30 [ 290.699681] ? _raw_spin_unlock_irq+0x27/0x70 [ 290.704157] ? finish_task_switch+0x1c1/0x7e0 [ 290.708635] ? syscall_return_slowpath+0x550/0x550 [ 290.713547] ? syscall_return_slowpath+0x2ac/0x550 [ 290.718456] ? prepare_exit_to_usermode+0x350/0x350 [ 290.723454] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 290.728803] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.733632] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.738801] RIP: 0033:0x454e79 [ 290.741971] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.749659] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 2018/03/31 09:45:49 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef5") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:49 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000a80)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:49 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x807, 0x0, &(0x7f00000003c0)={0x0, 0x0}) close(r0) r2 = gettid() mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ocfs2\x00', 0x10, &(0x7f00000002c0)="257c541e473ea15ee18de1a6ba640b10f96f8bd93f6ea3e5fd3d9e638c10d6d4a819ce3327d5e9aff6b213e8d8494eb2a774a225ab64296146927da6018af54dd5afc4f93ee116871f2de2214880f61271003acd2de387b2698a18abbb8f93340c860cd308ff4b7beab9f1382a1d95f0c131ed90f7f0193a1e864088e40bbe5d2b030f30f65467ac419417a7611a0ac02a5f4ca6b4598cad1b9087122bc64994791cd7336c") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r0}, 0x10) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x7, 0x20, 0x100000001, 0x5e7b, 0x0, 0x3ff, 0x40000, 0x6, 0x192e, 0x3, 0x3a5, 0xff, 0x10001, 0x1, 0x9, 0x6, 0x180000000, 0x800, 0x2, 0x80, 0x3f, 0x6, 0x3, 0x3, 0x9, 0x3, 0x0, 0x100000000, 0xfff, 0x7f, 0x54, 0x4, 0x0, 0x9, 0x6, 0x4, 0x0, 0x1, 0x1, @perf_config_ext={0x401, 0x800}, 0x10, 0x100, 0x5, 0x6, 0x3, 0x2, 0x100}, r2, 0xc, r0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x6, 0x7ff, 0x6, 0x200, 0x1e, r0, 0x9}, 0x2c) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)}, 0x0) recvmsg$kcm(r0, &(0x7f0000002800)={&(0x7f0000001600)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001680)=[{&(0x7f0000002740)=""/161, 0xa1}], 0x1, &(0x7f00000016c0)=""/23, 0x17, 0x4}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000002840)={0xd, 0x8, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x17}, @map={0x18, 0x1, 0x1, 0x0, r3}, @generic={0x13, 0x7, 0x9e6, 0xec0}, @generic={0x0, 0xffff, 0xf6, 0x80000000}], &(0x7f00000001c0)='syzkaller\x00', 0x70, 0x1000, &(0x7f0000000440)=""/4096, 0x41100, 0x1, [], r4}, 0x48) sendmsg$kcm(r1, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000ac0)}, 0x0) 2018/03/31 09:45:49 executing program 0 (fault-call:18 fault-nth:45): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) [ 290.756908] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 290.764156] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 290.771404] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 290.778655] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002c [ 290.791138] xprt_adjust_timeout: rq_timeout = 0! [ 290.849538] xprt_adjust_timeout: rq_timeout = 0! 2018/03/31 09:45:49 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 290.880881] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 09:45:50 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xd, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:50 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000001740)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000013f00)={&(0x7f0000012e40)=@hci={0x0, 0x0}, 0x80, &(0x7f0000013ec0)=[{&(0x7f0000012ec0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xbfe}, 0x1) sendmsg$kcm(r0, &(0x7f0000014540)={&(0x7f0000013f40)=@can={0x1d, r1}, 0x80, &(0x7f00000144c0)=[{&(0x7f0000013fc0)="3d2ec53983366e35546175843a9e0e2bb668dad5613628d3f6ebcd05cb58138146dedd8d0d8ec0f34774f86fcfdf8824496c49116fa6e2b306429ed921b6285b88750d05e2aec08520173dd7c1c94391b4e3e79a6119719016f9b9a962afe0a78301dd860b00267c6b7a8f58cc0781e0084a3bb2f637129b", 0x78}, {&(0x7f0000014040)="7283b3a3ec499d0f0705b160d4fea511c51e99e67e904a62f1f92863c83d61fe881ec50b1b60822a8cdc9fcabd7739b4ee9f97dc1dbc8fcd235da9a03b85b381fb1886311c59f475a9a4a583000a172028698c22d3d6942e8b5df14c4bdc10274b3dd6879934d78b713f79336e87fec8865a65466d", 0x75}, {&(0x7f00000140c0)="d99082a2598cc1e0e6959a5ceb5b781ee922cb9c38b90bf95d0d8d3b0cd0deeebe8e74f79c54106bda6b2c98fb826729c28b199bc9b05209e8a863adffd2a548f5d53a14a4643b76a3faac898dadfd98ca0848e634ed3146ba6743330a78d41e871d93809aa02be06a3eb120feb5e553", 0x70}, {&(0x7f0000014140)="8ec9664d1d98b9b52e3fbc0f01e5ee2dd1b423f2903422765439d5f1493e419d9d6dc9c848fb5268", 0x28}, {&(0x7f0000014180)="39c263c8881cd0a42ba27b631e67b9a2aff3f7ae471e5c5c95e898c2c906ae71c1a42f02602a9d42dc795c0529d855ebedd8632c1d9d7f54952016ff44f3cfe46153302727d96f622a21c1f342f913efd7fdd755087bc7867a925a378313a91b82c9b7d7fbeb4990e2d0ddbb5cd8ce94488abd88a457ea2261a10636b1948f743754e40ecf6ded6e344c0e044df86e6e9b12cc8e45f8841d781cf4e34078ed1d7136", 0xa2}, {&(0x7f0000014240)="3ef5d44b5a412d841aa88b874a331bda3dc1108ae85c6c9aaa8b40ed550b91464565841c2325345e81d298848783b503e4c0a1caefd0f48c56ee78502f2a6c4d2d4089c4f139430966be8087533e55dfc27b3b5f74173a042d914633c2fa3bb588520d434f7ccf8b9a2b892cca944ad8d58dff7e65b0c393a0f62882e640a8db", 0x80}, {&(0x7f00000142c0)="7f76cd26fe927b73685d52692831e0e7359e6958e4d79582a45c6dcee1ad67d094b66731ea8c71c7a672d1aaf1402f2d8acf3729c6d3b96092f96e6847394602a32a4eb8f358c0a2d9b437e34be163d78a134d5a0a91aafb70aab1041a8aab02018a5de7548731c91ac191904959b87313716e3e642f2db785914272a6fb1aa2e9d069542d1b2f7e4e75b6a50d0bf17d6e07bae240f50b750dd2f4bba3f56ac0636916a93d533045e72c48ce297b691001bcd52f1f926c0f0ea5546672749258b73d1eff3bcef8828673d396542fd947db527444422bb1c96b7f59f9874ab4fd8f", 0xe1}, {&(0x7f00000143c0)="b08dddffda1bd3e0bf9205bdd038423181c38af3de5f94a49fb3d1f6690e9a1e90902ed152172638cb94130324aae5c3eabeb847aab2256d534f165eb19b5890f98c074ee9bb794eb60c224a053e5e7fb02d3cf4e769df343472795cffd1b672b28ce53a720242ed65168f57a35f3813e77abd5f6e149a5867e6ac0c001a668daa603369ffe75d83153038282b5697aa74e6997a01ae7c15c1b7703227d63d923032a62841a75d8e19c7af76e1286462c48cb02fd899d03e6e7c08f73a0e51d8979d9ccd", 0xc4}], 0x8, 0x0, 0x0, 0x800}, 0x8000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r2}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(r3, &(0x7f00000017c0)={&(0x7f00000012c0)=@ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001680)="b5c27d78a0c98da6eecb889ced5c72b4513d96b9b2d2dddfa1d30f496d6858c8141691fff094146972cf57ce475fa85d1dd869b480d98d0365d730848a13d282a3d524118cccec3e201e7196ce76b6b00c921d1927", 0x55}], 0x1, &(0x7f0000003280)=[{0x1010, 0x109, 0x401, "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"}], 0x1010, 0x4}, 0x840) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r2, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001700)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r4, 0x3, 0x8}, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1f1ef037b3760767cd8c775fa395b6f8bd2d69edde61ea21ffe", 0x4b}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) recvmsg(0xffffffffffffffff, &(0x7f00000021c0)={&(0x7f0000001fc0)=@sco, 0x80, &(0x7f0000002100)=[{&(0x7f0000002040)=""/180, 0xb4}], 0x1, &(0x7f0000002140)=""/74, 0x4a, 0xa722}, 0x2000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001600)={&(0x7f00000015c0)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f0000001500)='./file1\x00', 0x4001) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000001900)) mount(&(0x7f0000001280)='./file1\x00', &(0x7f0000001540)='./file0/bus\x00', &(0x7f0000001580)='nfs\x00', 0x4, 0x0) [ 290.940552] EXT4-fs (sda1): re-mounted. Opts: 2018/03/31 09:45:50 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef5") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 291.133565] FAULT_INJECTION: forcing a failure. [ 291.133565] name failslab, interval 1, probability 0, space 0, times 0 [ 291.144924] CPU: 0 PID: 22086 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 291.152191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.161528] Call Trace: [ 291.164095] dump_stack+0x194/0x24d [ 291.167698] ? arch_local_irq_restore+0x53/0x53 [ 291.172344] ? __save_stack_trace+0x7e/0xd0 [ 291.176646] should_fail+0x8c0/0xa40 [ 291.180338] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.185417] ? kasan_kmalloc+0xad/0xe0 [ 291.189278] ? kmem_cache_alloc_trace+0x136/0x740 [ 291.194104] ? __memcg_init_list_lru_node+0x169/0x270 [ 291.199274] ? __list_lru_init+0x544/0x750 [ 291.203487] ? sget_userns+0x6b1/0xe40 [ 291.207359] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 291.212088] ? do_mount+0xea4/0x2bb0 [ 291.215773] ? SyS_mount+0xab/0x120 [ 291.219375] ? do_syscall_64+0x281/0x940 [ 291.223413] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 291.228758] ? find_held_lock+0x35/0x1d0 [ 291.232796] ? __lock_is_held+0xb6/0x140 [ 291.236839] ? check_same_owner+0x320/0x320 [ 291.241140] ? rcu_note_context_switch+0x710/0x710 [ 291.246056] should_failslab+0xec/0x120 [ 291.250019] kmem_cache_alloc_trace+0x4b/0x740 [ 291.254584] ? __kmalloc_node+0x33/0x70 [ 291.258531] ? __kmalloc_node+0x33/0x70 [ 291.262488] ? rcu_read_lock_sched_held+0x108/0x120 [ 291.267491] __memcg_init_list_lru_node+0x169/0x270 [ 291.272485] ? list_lru_add+0x7c0/0x7c0 [ 291.276435] ? __kmalloc_node+0x47/0x70 [ 291.280386] __list_lru_init+0x544/0x750 [ 291.284424] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 291.290287] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 291.295289] ? lockdep_init_map+0x9/0x10 [ 291.299325] sget_userns+0x6b1/0xe40 [ 291.303017] ? set_anon_super+0x20/0x20 [ 291.306975] ? put_filp+0x90/0x90 [ 291.310402] ? destroy_unused_super.part.6+0xd0/0xd0 [ 291.315483] ? alloc_vfsmnt+0x762/0x9c0 [ 291.319435] ? path_lookupat+0x238/0xba0 [ 291.323476] ? mnt_free_id.isra.21+0x50/0x50 [ 291.327858] ? trace_hardirqs_off+0x10/0x10 [ 291.332155] ? putname+0xee/0x130 [ 291.335586] ? cap_capable+0x1b5/0x230 [ 291.339451] ? security_capable+0x8e/0xc0 [ 291.343574] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 291.348742] ? ns_capable_common+0xcf/0x160 [ 291.353046] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 291.358213] mount_ns+0x6d/0x190 [ 291.361554] rpc_mount+0x9e/0xd0 [ 291.364896] mount_fs+0x66/0x2d0 [ 291.368239] vfs_kern_mount.part.26+0xc6/0x4a0 [ 291.372794] ? may_umount+0xa0/0xa0 [ 291.376395] ? _raw_read_unlock+0x22/0x30 [ 291.380516] ? __get_fs_type+0x8a/0xc0 [ 291.384377] do_mount+0xea4/0x2bb0 [ 291.387893] ? __might_fault+0x110/0x1d0 [ 291.391928] ? copy_mount_string+0x40/0x40 [ 291.396134] ? check_same_owner+0x320/0x320 [ 291.400429] ? __check_object_size+0x8b/0x530 [ 291.404899] ? __might_sleep+0x95/0x190 [ 291.408850] ? kasan_check_write+0x14/0x20 [ 291.413069] ? _copy_from_user+0x99/0x110 [ 291.417204] ? memdup_user+0x5e/0x90 [ 291.420896] ? copy_mount_options+0x1f7/0x2e0 [ 291.425376] SyS_mount+0xab/0x120 [ 291.428804] ? copy_mnt_ns+0xb30/0xb30 [ 291.432669] do_syscall_64+0x281/0x940 [ 291.436534] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 291.442054] ? syscall_return_slowpath+0x550/0x550 [ 291.446964] ? syscall_return_slowpath+0x2ac/0x550 [ 291.451876] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 291.457218] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.462047] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 291.467225] RIP: 0033:0x454e79 [ 291.470396] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.478083] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 291.485330] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 291.492574] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 291.499822] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 291.507071] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002d [ 291.657110] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 291.693960] autofs4:pid:22099:autofs4_fill_super: called with bogus options 2018/03/31 09:45:50 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad526") 2018/03/31 09:45:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000003000)={0x0, 0x95, &(0x7f000000c000)=@framed={{0x18}, [], {0x95}}, &(0x7f0000008000)='syzkaller\x00', 0x24, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001fb8)={0x1, 0x5, &(0x7f0000003000)=ANY=[@ANYBLOB="180000000000000300000000ffff00002f00000000001e0000000000000000009500000000000000"], &(0x7f0000007000)='syzkaller\x00', 0x5, 0xfefa, &(0x7f000000df19)=""/231}, 0x274) 2018/03/31 09:45:50 executing program 2: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x6, 0x1000000000000202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000100000000000000008000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) socketpair$inet6(0xa, 0xf, 0x7, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000002900)={&(0x7f0000000240)=@nl=@unspec, 0x80, &(0x7f0000002800)=[{&(0x7f00000002c0)="61553e5377dc81ee3f87736ef6f5c582aa2e390f5fd03c6f13abda9e49b34ff453aad3702b685a77cc934602c2f4a49afc05fb853bcc669d721e62618b5a17404648e99a0b5caa7072b143ac1f283e67c2692463a64d9c5f6cc4054efe565b3519161d7bf40acb35b8a3259589f452762ef77e7ac05831ff06ba5b56d4c919a013a9bf5a0b35ed4def1f012691382576e2de824a886f847d8486b783e07d5bfc5d87ec1730ebf931f6bb5a6506d6cc4f0f3ef7065ab1844aae9d30e58bffdf4d27afdafaaec82f502444811b7d8452c9ec5f7b286f24e2fed51e5cdde85d5d48be7cbde62c7452385702c8bebd54974493", 0xf1}, {&(0x7f0000002980)="01aab023e74d9b5b780464fd2533f7b83d89a89028da2e2c1d850adeff4b5d1b3912e5400c5e531caef26e2cf6c3dcad286201f96f5b8bdb8c6f7547a5ec1e573243992168a3d10c0fc1dcb19e41d4aa5dbb3231b75f478654bc8507bbdd22590959565ea76be2984dbb05f919c767f6ad1880d79e0c23e2e670ba88355e694b5132305b2b1dae9757acfb41766f702a12350159ab107dee2688ba9866c232a27e2b542c345a0d0eeae0b5fa398f773acfcc99855cd9b8e1a28a173146650fdd19505161175c33b5c4b85efea8af469e9b936500e5736293e58a57795d5e99ff030203196dedaae23b3718d3d763c80efa8c0469816b03ac202ded8d97d92d1751efc2437de297e465ff218ff7bfa7104bab1b23d52bf9ba83b66b276749969e06d9e815552d292d8279bb24f41dc6522504489de332f4dd1001689c23753e9c065a6108b4cab25fa5a51088f165462a8c1f9189416aca62443538be90218c5c1ae138b7b76fe32703b0b8e28fa7f45345038a4d1a01d0e96f1a0a143710cdc2a832632f75cef2afe2c5bee138105918138083549fad392c1ba975e8a0f198e04ef534d67708ed654b83d0791423a85e16d063ab2ffd18ca62812449f0ab56ffec443aacc88ec8c74c072cd4588ce46607ee06d3973ccb98b33b4633dd8b7760f2f92cd787337df573060984fb23836a00123c6cc940b24ec4ce10503c0071425270ff72da64d40ab8c654d303ea9952fc38efb2af3e9ac852025392821d7eb9870c091b17721bbe8f52e590b1077d5c320c9cfb21eeb5115202a64b7cd7aff8dfc2f26d9ecc5e7d30a1934644fffac7c1d6b8e13e0dd59b40ee54e795f65548d53d4378d6dcc54266a9335df188d9cae5c2726091e69c01ad0d8eb72eedc32e652a4397ab6e1e7fdbdd4601d814bef624aa2bd28a00a97f1e570d64cd57688b5cada2ebf870b948edf75b1429749cf59b8126ec36bf8e4222d18b8b56377db1b76d2f0a1611966586677b3e1058a203186d1bd8b9eb71af38068f6233c2d7369938495af046d32344af7dbca34eb68996f353d8e80522a47d2e9e6f462dc50295553f71c7d64e9d2e79c849dfb43a410eebf65b4b92467795d0f79a3913c7b3a34d99060ee2f45e80b000fc42c9bc194ced0cef8f7a060048e7cc43ee4a07815e352509e8cbd0f1486ad57dae44e6aa85e32b73d9a2797faa1d2e2a1f72174cb7841a35c3d6f23b9b627d4ba73c07a1f3f06019a3d09749f8d1d19aa68726e0a3ced8c78eba131f7a683182d4f43fe833aec826c99f4b2f81447a697717b1c55086b2e09d3d5f4e252fe0fec91481f5abed36e456c2d2fe7e25b5ec35b6d1b6d7d438dd5c19e791f2dab41b334b8bc3b542ba490ce7fb057f917cb24ede1b4b357b9c91a7ac9a5374f6e8c7738cdbeab71c8ce9082972efccba971eae3b2f047fcac9cbe0d66b6e284ea7b393ee8cdcd3f9016e6fdfa1b01f53c2b9f535b327854998beea1459927ec2a450261e7acfa1d2203142d97aa89ac7e4de88b929ae1378c594230d6f7a06526bc76672b507939ba2ee499b1a95bf58bb117e2087391b845605d8adac3145fff13215b8c41485a637c9745d9e443deef5006925f58fadfd0c778bbf8e279cde6282a124e358ec40c9fab644cb652120b3ae5a84ed1faa251b66f3281c7bd1148abf6972de739b0868f0ee72d8a03d791675f41e5c5732ef660cc01b0439a7b182a6740f80b6794935c9c4f81a949e8092e208f67af0edf9d965b72b67d6e3c69355c70dd53ff5614e2791512bb9aa815ab61edb1737975908845ac27260e628cec1934a31cb85a5b6ff8a6e188d3fb3d9feeb11a0444902041880054527189a91d3119739cb94a12252a95bc391990d25d713fd541307eb2d117716fdbf571784872d3e43bfa16750ad9945b1eda8a5c1b1f52c744b5dd20d69c49738490e88a29bc5b861952511e0a1971e2442013d992a45dc6b67611fac45ac69bc1ef53eea37ca253f427cbaec9bf192bfd70e682150cca8a5428e1149b2c6873614d0f69e62f3412f7202d698f4086ca7c799ff3faa3181bf95f8b53e2cc6e0ad7302bbc4bdb2fcc04f47930809dd5865fd0b784b292e9aef24845211c384d71795fcd00367d747dfad9eb520a205035be81b5e300a6c78d225c6a741eb64f0a050e88a8023caa0d0c325cd3e5e462dc0f1859c1404786401089fbd83131971ff0a68f3cf0d4976d45586044b11007b0ac4b9954de0b22ce26e463132c9fe44ae378882d59963eee70c3093d5353be905c979ef3532c25c42c28a6a32318304b3d93b4f5855a0810847455e417c496648589dd14197d179e0e6dfbdcfcbb5f1b1a305a58dbf48bfac0d398250ee1f271156e5d91c73f0f3d353bb414f10a9610cc629793087c282b038de3100934de01cf56d8b081d827a7a4bf758db70a2b59dedc68a315563f696443b2f7fb3896525ea61f7bc2de3a88b6e4d540b93c86b7f01db6dfaed4d11f3db644e4cc708503d39b6b07e5decc4678ad3ba1c13cb227f2cfda51d997d4bec6e2e2f98305d3c91ddc9fe00754226f703b28bdafe7a4b6667a208428913f81a7a52d486470b34059e8bfad6d703c467c14f5f69033d6752ee8b4cea14ee876cd8cf9559c31a29fd59b9e238f4757b267f6639182ff7ae49ecf248b0c87df427c768416abc9f9b92f38d144d446640c552494977c1828e8d60f22ea5522f0a447488010f792779834ab12a7da1bc9dd3b3f96793c8051ce7686d6a6149b133b374ba0befe9555a4eb46beb2b25b337cd0e0bec9bc52b862a2b7d0f27ced5e4109f5cd8fa738fc6f89f2a5fb47731cf5df763e8742c1c45831a284c2e865222ea08293af0fc2688438d69fdbec796f25481edae00124e3e640d305412719f1c3769616cae258073ea182b3d504f1b3ce1e4246c5b5f100bb094988ebcb37102763f96ba95b756df4872dfed327023021d9fcc63980b1f23c9026f8e62ad1fe37206776f026f0698506d4cbb57578dc0ac337f1180beb4ba7ae6e43a060295453e4c4da4975f5db79fcf88074c282d7ffcc785ec54832e9fa6fae65c2297ba3a964c56955b773d8c5347f53f0f577f12788aa6baca0ebdd6b10ccc87c4e08fa4a90447ce9cceb10ae66057a39c24a5f4f63ddeed3c73ee09338a04c440cba7bc7f126c4d68e42b73dfc7fcbea7f847b6cbef5d2ca4b065406afe44b81ffd37dedc9779b4d794542d9c69f445bf1f792576a54a784a995e324e6d079a84814a462b33b3ee424ef36b34d199397195eb19672fc23cdc50db1e60b0a25d92b345b1811d13a41fe5c435f6118b54bb9f5bfd70c394a14e5e23d5e124dfdadb7f8216de82ee192ba15b5c5d7fb2edec4f72866e45c09482cd9185c44e136955d4a3792edb621842defb459744e5e5af48298d49f0d728a212aac41f41d8ca905f2148fa4f9b0c3460b7333e31f5bd34255b21fce5abc09998de8f7ade93e054fddeecea4820ff7ee438bb2f6bee047b395cb624103d5ffe947cfbf6d9a9086c1a18cdbc5e7e48a9dc0e80fcc09f5208a70b6d0fc95ce30feb72b9d4d1f6a111d6028c2b53f06da5cb29e98b1b28c159dc9b0b91d5fe0d7cdcb03b950ad3558e71522c9a31b13961a0f3ade7ba5932bf38b81754371f4eb36ed51d96b2e1c0084779fcb9c308bdb06c17d4bd8b1057d5c482a3a9e50588d03c2a48501f5ebada0ec2460599fe849e74e667634b219da27172d798cc30ee2b7adfbf698dd4c45f8b6baaf0cfb16fb903417b9ef08c63b97011845d5348be7752e9abda30d2a198214b9fcddfab6ddff9f2f236ff2e0a3bb4623ee7c7b3341753848136adc0586a5309cd287454ad2fa0312ffcc699eb38e1be8b206a5aa0bd329fb2a214a5f407117e9b0371b4d5be5b4c1bcb7ee0f53199991594414bd2ccd77cb57ae31cc1e9c3e2a2b9655fb75b4c77c500ca1106f991e97b17d10ebb7b63a1dbf558a2eda2e980450fd9a49bdb2ee7969cedad70793465486a781eeeac50aa2637eb7e9afe67f53729c1848832dee2b4e5937188b850fd45eb17efac6d16ac82d2024430550da25f3b2399dc1c2469c7b244641ed9543438ec4f12481efca735d46ae5a61fecb89e0a4bba733d1fe5139103c7465a4ba4d2d9b30c8ec09521a22c414e1f16ff2292a171f768a33c88e0bd65858e41f41ebc636181f9cb03cfd31716da0a8abecb41c1d5e0ded672afe100e89baca7ddda7713e808d77bc126f57d1030eec0db5bed6783829c7eb87837f687f9543d309ec88bda9957e7691f6c5da349715552e19364304d7f33830bbae770a050e645e5df886426f85039dcf2a394aa6503d87ed3c437d18ca0b41fd046e45d1e26ffa0a4554d39a230582ade6f45f61a8b920122a7e8c1c7cbbbd0a6e7d63e87410ad4040086a59373a598b686db35825fbbdc2998dc8495779700379dfbc49e0cf11834353a3016b9cc60ffd18699f38f2c81ce699d8974e911aa8eef2e9da5ded7040dd52a996de1123c7bc673c3cf8ed4475e95e170bcfad869df2d3d9823e399a3cb77a7f9c7a4ce85d9ff1b20609c033a245662e61f6db26a321e38b37c7bfc95630df2c40c59b532196fd5adfa371287cb47c457c2dabc3dc4e60973e95fd15fb940af41faef68645267c929917689d06ca737487950da5b556b8cae8525b891c95a176565d2b7044267a7c80ba4f0130d53dc1256988268d9b93d7fe247c2649e3d1ed78fbf3f67c1e5ebd96430a59aa3160a22f7fd7d74f55d503b27b424a79663f2bb8e9f47714b8a0397284b23ac8d695f3e00e0eb6a988097e12e144836f3faa79700f81872f59040e867888d37280dd9d50c44a163fded7ef71328f575ec47878c36c49338e17a6ec89b0cd40f2dce5ab2cc4cc3c7210e37fb7c1f8c193275858dded3a75a3be1726dee3086f8deef118416ec0d95371d6439fab4d13b267468aa041c15e83f9d03ded269339b9fafc865012b3ec9c41c361c0846dce4607e53531857fc5e6a0534288ae98164012a3717e437784821b8ec576a85944534cd2830147c20ad736b45963843f1fa539f3bf63bd88298052a03546fe87f6827f65cb48d17be78e6e9ea2b3fbea2afcb22c0bb564837765d49de401695cf6d267eaf610a611de9d199a7c1917a96b80cc6b171ef11ab0258bb2b547e6d300234f290588e3abcdd0e2c2bfde506931cfb2acc3337b418e9b8d9ed5f0e6629328d75477b06656f7fd342e39982a52a171cd5094f57f2943a1fb8b8f609a5e0d810b374ed2571e47a4dfd43ba5b37fcb5b20ffa1a0576d3dff837a5117ae049bb2d181f273de34d0d66beb757c92636a0a5c4fddd9416c6a3d86d3ba9bdaa6d4070c94836471468ba8f37e005aadc8d3b7a42ee104ef0c1db8ca89e570c238c4ddca924ffbbb2bc51473cd84df46dc0b89b96b4489ec6e752ccab1fc21135d854084563474ff10b9c07dbd8fd8b82704aafec4d1e8f4955835ef05cd48a111e5bef7a63bbaabfac8ade267270b6a0653b155dc628b1e5bc72545d472ce7490c5f13242b1644a616ed6a008437f96f813e561104e6f111a395974cac0e44a76a315a19025bf2771bd9cea4b2528fb300cd4897983f7983d964dd237e0b4da74cc07b0f9097ef9f63dfc5234fe0412d526e426ff174ce11dc7dfae4df72cea46eefb059a6fb131ee8c86f391f0c9a071771c906ee2c6cde464afae5b5ca80bf9b22e72d5134a1274fa81d4636d6b591b99b0fcb7cffe370568f6d655ac419c0fa0be4fefbe1ddead61e69fd834cb31cf4a89434fa054dd980511205231366421050a6b3bd594551627cae2c2c965805d5fb08412726", 0x1031}, {&(0x7f0000001780)="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", 0x1000}], 0x3, &(0x7f00000028c0), 0x0, 0x83f}, 0x851) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x1ff) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) socketpair(0x10, 0x800, 0x62ac, &(0x7f00000003c0)={0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r3, 0x28, &(0x7f0000000400)}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000180)='./file0\x00', 0x44) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYBLOB="45c118c2080000687e1434747f0d48075c7e3700"]) [ 291.729280] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 291.747999] autofs4:pid:22099:autofs4_fill_super: called with bogus options 2018/03/31 09:45:50 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x138b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000b00)="2e23e08609608dfdaacc61056039fa74274f350f519ac4b308a6583d10d7d6f7e744ec7d914673c450e93aeed0e3cb6db6b4b0f00fc8f89f3e8396fd0978d0da39736f02c38af961fccdd92e500caa03ccfee9da80464847f5e3131d46f871ecaf67384b140f04e339ac7bbe2deefd103e628f5be03f12ee19edba0456f4a500e623c2cd4f7a8d7286071b9c86da107515bae7fb38a0d8150c51903b22d5c95ca480e9e74c43d9b622f3afe821771d8c7c97ec1f21c6f4b220350aa4649573bc9fa86a69a90bdcf56cd5885f6ae657bb2cc4d5d38de94037ead37fae90ab0ac50bb7c5d52f8c44007b7e4b960b33cc505edddf87685a", 0xf6}, {&(0x7f0000000c00)="5c1d15fda357c8c0073c16ae7e2be1d0992086da0583d378aea9726f31231dd366691017c17224c0f4a6", 0x2a}, {&(0x7f0000000c40)="2998b1df2968704b035ec033d97157123f26d9d5654541507716808388306e0496e962baa9b3fc11b1776ae0aae3ad147788a9a22cacd2e07b4a838c3c6be7cdf6add4b2e3b3fd9e18b2f514b4c07e230e368cbc8f6f58c99497f6c7f26147265f07fb9abf0a891e9e1f", 0x6a}, {&(0x7f0000000cc0)="79b80e1466fce762d665f077971c041e3d46cb313a3ab00b262dbaa0ceb392b6be024b1cee2ee650c57b2e5d3bb677ce24f0735d1e404e4762cd16a0a64f059058878c87fd88351e47a5c97fa4c48d9171f23b1ca0f05b2adcc18a13e1945fc1523395e44037657bbf672e113ab2299f2582", 0x72}, {&(0x7f0000000d40)="329d9cb0ce22b8852bab8d44e73335f050cf97dc54c3f00b38d6e74d67ce05dfadde3c5564d4eb5567064d20bb7fa198ae340218d60f962d22d6cc11d66a1c7c58de6f7a51e83beef797711f39052905865e73e54a72841676bd6d98038a69b7750585546e8db2331a75bfabdc717a3967ba61dc593cf10e75efaadc59a13d106a82fadca6ca5d29ac6004ac7ba35257ef57a7391d560893966ef9d6e6e9bbd29e605ee330af944184421fd11c2721", 0xaf}, {&(0x7f0000000e00)="8381a5ee3a4a01993fa0411ef74e602cf31220fc41395c4b38c6b631b44b549d302f68341cd26d944c50ebb31b54dc018afabc2662424f59b53aa34b58ee73bc7905687c6cfdade9aaf104423b1be12819ee876e6f505089583ea63712a27375274fbde6d8c61c1b9e682ded519cdefc2dc404b2dd235af2", 0x78}, {&(0x7f0000000e80)="13123da293c9ee152629e4827b0172cb59d78055d024f3347e9621a6a161ee272aeeb6f185d62108cc9767e6de46c058795c4fb4a730672e0d05d04c89994a361c4275f99bda92d8ebbe7ea573a53e36b452d3dba4d118998b45c988f46c3522834eb0b37c3643575f21e71ad5402de48cddeaa7e941521251ec1a68b90a004ea4ba94fd325a47028a9003900f8c08cf5c", 0x91}], 0x7, &(0x7f0000001600)=[{0xa0, 0x10f, 0x3d2, "5454019c1a5c96b8b0a290550acef34100b91778dbaa5c98cbee73be3b708c32bec9a4c22fbad8e8edd12216d9d96b5ed377ea178a28ad6d842c95370ccb607b61b0068e5809100f69b3029dcc8b0600266396aa6fc0b3c36eb18afc796c6b202fc1b479d99a66324c0ca97b5cc71f7f2202054d5942842519f1e7b3f7631061331d8c6c649508896ef4e5c532e0"}, {0x1010, 0x84, 0x4, "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"}, {0xb8, 0x112, 0x4, "937944cb8d7c8deb544800d245a8e0425da9d75822a30d00a32c1b82c81c3b5bb0ac2b44d28c781c73bdf5d8cc24fe5eef4e56621687a834eb8b677f41b9b5073347f69b13b7b92a4045ded3ddad4b1c8933aee7f6518edb95005240ef056d2d55fd170da1be79b0e24b1e8c931be42c258fc407c639a991a74c248da15aa9d0c72a856cfd751a637eefabfb96c932ee4195c7e53e3abff49c970fc872da9bd2b1f0acc332"}, {0x98, 0x0, 0x7, "51e83583730a6acec05665dc572efd93e3b047575e1127ba2baf2b22ed4498de7f18b1b021b44edb039549a48ce6c33a8bc25ee85a6a660a5b6419b29b0608c5b09f82a7432f1ac7ddf99a29ce4f2c30075d43862c5e0cd5c7220eae35d85249d7c007ed48408805055082eb89e0ebc51d6f8fb9ebf6b8ac9ecf2722e7826e557c"}, {0x100, 0x1, 0x92, "73ad6672d9c2020a0f74ffafa785de8155192e680b46be7098fe4315853462ba83468c4d45a3492e8077aa2ad78adf3c1d4e1aa9049a1154642087a11918161fbeb97393283f2a0959495ae6d53809b83cdc1ceec23492c152fe5229db404294b11d75eed46884103696166c050520d7de0c6310843c0ec5b5cb5a9d5380e770eed0ff132c3867aaadf6991a622f96d52b4592985e14b66461cd87eb565cc835f6bcdefd789be89038aad7cef6674c3f83981bea48466cadeadb5909d031c88195d88ca8dd2543485b7766f7ef7726a9746d9379a66cee9325129846c841ee9abdb39f0c7a58ff47c0aa4cc2c00c5cae"}, {0x38, 0x11f, 0x80000000, "ac478094c0f452c58b761bf31a7ef3a63cab8339c4bc5be5270c8bbf07c94440b14855d7b81e"}, {0xe8, 0x119, 0x1, "01d97c638dc8ee6c90a34d2186a21ab72b7ab7fabfe66b5605b4463d9836ad00bd8cd50bf88bde71f1178d816b70d1021bc1c470377d95d1f6f67c885c65b50c531c8620678ecac00b5e9c32f72ce7a5489a067318cd12d13eda3a26d35789d44d35cc06fd82ece33f52c82bb2743043ac0a7bba62cd9f3c69263e3bd15f42a24ed54b74318c8511ecb931af7577e596c292fe5c07f572b7bcf93618701dec95d39dd0bfb03f59de9112a9b652c545274e55537ed871017729edc34da44ccdc3f5f463dcde55921e242b0821fb0e854f57"}, {0xb0, 0x11f, 0x9, "86a5f14732ba4a0ee15cec40657ad266f4c4b828ae39eaccdd91664f5f7d2d2902f627158c0743c52c812284c50543788e0cdc1f5c38183f4eb987529c9e7d2d3be8cbd9e1d413e0138f3d3c7d48b95efdb734f4229df66b1f7888f9431a8966e5a117b4661587a07a3a41b6d60966f4db1063558c1caaa157bf3028d723c23277166b4f2e9e475af8a3ec64558bc0701514236a5b21750c5a057cb6c2"}, {0xa0, 0x112, 0x0, "3924881ee2916afc91a67b597970ca67458ce3ea9ce36adc686b05f6f3cbbfece4cbba3f15bb0dbe90af538616f8bd57acece0a756e42a7fc36b0a608ce052251a2b37241fbe2a5998bd530aba0cbc41cbd3dd7cb6a4483481b0d1cbd57055bfcab738c06830c1f4bb134663cb34908d31b105d1d313eadae866df9b30a7bcd34c8212a6d255ea1c31cd357c4e275c4d"}], 0x1570, 0x4000800}, 0x880) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x5) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001040)={&(0x7f0000001000)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:50 executing program 0 (fault-call:18 fault-nth:46): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:50 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='hostfs\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:50 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xd, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:50 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:50 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad526") 2018/03/31 09:45:50 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb39}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000600)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000009c0)={r0}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000640)={r2}) recvmsg$kcm(r4, &(0x7f00000005c0)={&(0x7f0000000180)=@vsock={0x0, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000380)=""/137, 0x89}, {&(0x7f0000000440)=""/195, 0xc3}], 0x3, &(0x7f0000000540)=""/117, 0x75, 0x80000001}, 0x40000000) perf_event_open(&(0x7f0000000040)={0x1, 0x78, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) gettid() [ 291.925933] FAULT_INJECTION: forcing a failure. [ 291.925933] name failslab, interval 1, probability 0, space 0, times 0 [ 291.937252] CPU: 1 PID: 22120 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 291.944522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.953866] Call Trace: [ 291.956454] dump_stack+0x194/0x24d [ 291.960084] ? arch_local_irq_restore+0x53/0x53 [ 291.964753] ? __save_stack_trace+0x7e/0xd0 [ 291.969076] should_fail+0x8c0/0xa40 [ 291.972790] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.977888] ? kasan_kmalloc+0xad/0xe0 [ 291.981770] ? kmem_cache_alloc_trace+0x136/0x740 [ 291.986610] ? __memcg_init_list_lru_node+0x169/0x270 [ 291.991792] ? __list_lru_init+0x544/0x750 [ 291.996026] ? sget_userns+0x6b1/0xe40 [ 291.999915] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 292.004668] ? do_mount+0xea4/0x2bb0 [ 292.008370] ? SyS_mount+0xab/0x120 [ 292.012074] ? do_syscall_64+0x281/0x940 [ 292.016126] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.021490] ? find_held_lock+0x35/0x1d0 2018/03/31 09:45:51 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000ac0)="3807f874e84ff96337abf190b9a73a45a4b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839715759cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f43200000000a088e7de0443c6") gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x10000f, 0x4, 0x4, 0xcb, 0x20000000000, r2, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) socketpair$inet6(0xa, 0x6, 0x9, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a40)={r3, 0x28, &(0x7f0000000640)}, 0x10) mkdir(&(0x7f0000000a80)='./file0\x00', 0x20) [ 292.025549] ? __lock_is_held+0xb6/0x140 [ 292.029615] ? check_same_owner+0x320/0x320 [ 292.033944] ? rcu_note_context_switch+0x710/0x710 [ 292.038872] should_failslab+0xec/0x120 [ 292.042844] kmem_cache_alloc_trace+0x4b/0x740 [ 292.047420] ? __kmalloc_node+0x33/0x70 [ 292.051395] ? __kmalloc_node+0x33/0x70 [ 292.055371] ? rcu_read_lock_sched_held+0x108/0x120 [ 292.060389] __memcg_init_list_lru_node+0x169/0x270 [ 292.065405] ? list_lru_add+0x7c0/0x7c0 [ 292.069364] ? __kmalloc_node+0x47/0x70 [ 292.073331] __list_lru_init+0x544/0x750 [ 292.077382] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 292.083250] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 292.088251] ? lockdep_init_map+0x9/0x10 [ 292.092296] sget_userns+0x6b1/0xe40 [ 292.095988] ? set_anon_super+0x20/0x20 [ 292.099947] ? put_filp+0x90/0x90 [ 292.103379] ? destroy_unused_super.part.6+0xd0/0xd0 [ 292.108461] ? alloc_vfsmnt+0x762/0x9c0 [ 292.112415] ? path_lookupat+0x238/0xba0 [ 292.116454] ? mnt_free_id.isra.21+0x50/0x50 [ 292.120847] ? trace_hardirqs_off+0x10/0x10 [ 292.125150] ? putname+0xee/0x130 [ 292.128587] ? cap_capable+0x1b5/0x230 [ 292.132459] ? security_capable+0x8e/0xc0 [ 292.136590] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 292.141760] ? ns_capable_common+0xcf/0x160 [ 292.146064] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 292.151230] mount_ns+0x6d/0x190 [ 292.154579] rpc_mount+0x9e/0xd0 [ 292.157926] mount_fs+0x66/0x2d0 [ 292.161276] vfs_kern_mount.part.26+0xc6/0x4a0 [ 292.165836] ? may_umount+0xa0/0xa0 [ 292.169443] ? _raw_read_unlock+0x22/0x30 [ 292.173568] ? __get_fs_type+0x8a/0xc0 [ 292.177441] do_mount+0xea4/0x2bb0 [ 292.180959] ? __might_fault+0x110/0x1d0 [ 292.185010] ? copy_mount_string+0x40/0x40 [ 292.189227] ? check_same_owner+0x320/0x320 [ 292.193527] ? __check_object_size+0x8b/0x530 [ 292.198010] ? __might_sleep+0x95/0x190 [ 292.201978] ? kasan_check_write+0x14/0x20 [ 292.206191] ? _copy_from_user+0x99/0x110 [ 292.210320] ? memdup_user+0x5e/0x90 [ 292.214016] ? copy_mount_options+0x1f7/0x2e0 [ 292.218498] SyS_mount+0xab/0x120 [ 292.221929] ? copy_mnt_ns+0xb30/0xb30 [ 292.225796] do_syscall_64+0x281/0x940 [ 292.229660] ? vmalloc_sync_all+0x30/0x30 [ 292.233786] ? _raw_spin_unlock_irq+0x27/0x70 [ 292.238261] ? finish_task_switch+0x1c1/0x7e0 [ 292.242736] ? syscall_return_slowpath+0x550/0x550 [ 292.247648] ? syscall_return_slowpath+0x2ac/0x550 [ 292.252560] ? prepare_exit_to_usermode+0x350/0x350 [ 292.257556] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 292.262902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.267727] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.272895] RIP: 0033:0x454e79 [ 292.276065] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.283753] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 292.291001] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 292.298259] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 292.305507] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 292.312760] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002e 2018/03/31 09:45:51 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c00)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000a80)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") mount(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='bdev\x00', 0x2000004, &(0x7f0000000b40)="7713bec5598239e72396092d887ccbb28cc7d4f45bb62fc2704e169ee2072bb0ecc791460f76c64026fa352b50b257ed8543f6ee31dc3a69b2d28a5b6686b815a3c1932d322c85a25683aa7a3c44d12ef292436e9f0775e1c20b407c9393d8de236fcbdc2f8db1d29e8d4c62a77486ca1b23845dce86fa6a325be61ece3fc4ebbc32b8b0699f0fb500502af4678ec50b89c5dcb64d0c5d38f0723414f1d77675ebe25377d854262791c24ce9de0988f4f4") 2018/03/31 09:45:51 executing program 4: socketpair(0xf, 0x4, 0x2, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7) socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2aafb0bc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={&(0x7f00000000c0)=@un=@abs={0x1}, 0x49, &(0x7f0000000040), 0x3d}, 0x0) 2018/03/31 09:45:51 executing program 0 (fault-call:18 fault-nth:47): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:51 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="b4000000000d3b9a35000000000009"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) r0 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r0, &(0x7f0000001640)={&(0x7f0000001300)=@pppoe={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001580)=[{&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000001380)=""/6, 0x6}, {&(0x7f00000013c0)=""/230, 0xe6}, {&(0x7f00000014c0)=""/189, 0xbd}, {&(0x7f0000004000)=""/4096, 0x1000}], 0x5, &(0x7f0000001600)=""/3, 0x3, 0x751}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xf5, 0x25}, [@ldst={0x7, 0x1, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) 2018/03/31 09:45:51 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad526") 2018/03/31 09:45:51 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000ec0)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x7f) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000640)={0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000e80)={&(0x7f0000000a40)=@l2, 0x80, &(0x7f0000000dc0)=[{&(0x7f0000000ac0)=""/32, 0x20}, {&(0x7f0000000b00)=""/222, 0xde}, {&(0x7f0000000c00)=""/41, 0x29}, {&(0x7f0000000c40)=""/254, 0xfe}, {&(0x7f0000000d40)=""/116, 0x74}], 0x5, &(0x7f0000000e40)=""/19, 0x13, 0x1}, 0x10002) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:51 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:51 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:51 executing program 4: r0 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x3) r2 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r3 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x0, 0x7ff, 0x92, 0x401, 0x0, 0x6, 0x2, 0xa, 0x5, 0xe3ec, 0x4, 0xffff, 0x100000001, 0x1, 0x8b3c, 0x1ff, 0x3d0, 0x1, 0x80000001, 0x3f, 0x0, 0x8, 0x9, 0x9, 0x2, 0x7d, 0x42e, 0x7fff, 0x2, 0x5, 0x1, 0x0, 0xd87, 0x80000000, 0x49ef, 0x1, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x1803, 0xfffffffffffff1a7, 0x0, 0x6, 0x5, 0x0, 0xffea}, 0x0, 0x4, r0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0x2, 0x1f, 0x0, 0x1c, 0xffffffffffffff9c}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) close(r3) r5 = perf_event_open(&(0x7f0000000700)={0x0, 0x70, 0x101, 0x800, 0x3, 0x101, 0x0, 0x2, 0x10040, 0x2, 0x5, 0x4d49, 0x6, 0x200, 0x10000, 0x5, 0x1, 0xfffffffffffff801, 0x0, 0x80000000, 0x162, 0x8000, 0x400, 0x101, 0x93, 0x8000, 0x0, 0x3, 0x200, 0x400, 0x40, 0x10000, 0x8, 0x3, 0x7fffffff, 0x5, 0x1, 0x1f, 0x0, 0x100, 0x0, @perf_bp={&(0x7f00000002c0), 0x9}, 0x20000, 0x9, 0x8, 0x0, 0x2, 0xffffffffffffff5c, 0x6}, r2, 0xa, r1, 0x8) close(r0) mount(&(0x7f0000000400)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)="1d2e366679938d4d7b7abcd0f97a94e5d2d23b6a153b534a8bc0c04b6873662e1b18f1078b077df3e55aeb75dd04d3697d8e7c3850e817cdbd4e15afe488a1fcca6957c1fb7d368664909e10ce5d9c2f25e1d2f4c1a750ffd391b660b387882247f7ab6fe3a4d9035bfd632a4d5dc7c0dae1132ac56fb476ff0245d4e536865ca47a868a1b84624f1f4181401fe82b21a5513cfc1f837a1e08cda5c4ae6d7092d96f8f3e170a6095f3a0fe83d8", 0x20020, &(0x7f0000000500)="2ae58a34f307b9d9a01b35be38d783586999adc7711c7c339601809e437cbeff0b32e419718a80c9f334603f7ab1c7e8bc2308430599bc787b3c6a11b6311de0eaa5a1e99e24cbd9b2ec972e5a52faff2913405cc857e75c2ecafb1104058d8843") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)) close(r1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000006c0)) socketpair(0x11, 0x6, 0x7fff, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x9, 0xffff, 0x1000, 0x3ff, 0x0, 0xffffffff80000000, 0x40000, 0x8, 0x1000, 0x3, 0x1, 0x4, 0x0, 0x1e64a00000000, 0x8001, 0x6, 0xffffffff, 0x4, 0x6, 0x242, 0x2, 0xa4, 0x0, 0x0, 0xf77f, 0x401, 0x5727, 0x3, 0x80000000, 0xffffffffffff7fff, 0x6, 0xffffffffffffffa7, 0x8, 0xffffffff7fffffff, 0xff, 0x8, 0x0, 0x4, 0x4, @perf_config_ext={0xade4, 0x5}, 0x10000, 0x8, 0x6, 0x7, 0x2, 0x6, 0x2}, r2, 0x5, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r6 = gettid() ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x5) socketpair(0x3, 0x1, 0x174f1f0c, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r4, 0x28, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r9, 0x35bf5e58, 0x18}, 0xc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r8, 0x40042409, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000000600)) perf_event_open(&(0x7f0000000780)={0x1, 0x70, 0x0, 0x9cb2, 0x5, 0x0, 0x0, 0x4, 0x10000, 0x2, 0x4, 0x800, 0x401, 0x8000, 0x0, 0x8, 0x0, 0xf6f5, 0x2, 0x4, 0x6, 0x81, 0x5, 0x20, 0x4e, 0x0, 0x3, 0x0, 0x8000, 0x8, 0x1b28, 0x2, 0x5, 0x9, 0x8, 0x2, 0x0, 0x6, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300)}, 0x84, 0xc66, 0x6, 0x6, 0x5, 0x3f, 0x7}, r6, 0x1, r5, 0x3) [ 292.620093] FAULT_INJECTION: forcing a failure. [ 292.620093] name failslab, interval 1, probability 0, space 0, times 0 [ 292.631440] CPU: 0 PID: 22167 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 292.638708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.648041] Call Trace: [ 292.650610] dump_stack+0x194/0x24d [ 292.654213] ? arch_local_irq_restore+0x53/0x53 [ 292.658858] ? __save_stack_trace+0x7e/0xd0 [ 292.663161] should_fail+0x8c0/0xa40 [ 292.666854] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 292.671933] ? kasan_kmalloc+0xad/0xe0 [ 292.675795] ? kmem_cache_alloc_trace+0x136/0x740 [ 292.680612] ? __memcg_init_list_lru_node+0x169/0x270 [ 292.685775] ? __list_lru_init+0x544/0x750 [ 292.689983] ? sget_userns+0x6b1/0xe40 [ 292.693845] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 292.698574] ? do_mount+0xea4/0x2bb0 [ 292.702263] ? SyS_mount+0xab/0x120 [ 292.705865] ? do_syscall_64+0x281/0x940 [ 292.709904] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.715247] ? find_held_lock+0x35/0x1d0 [ 292.719286] ? __lock_is_held+0xb6/0x140 [ 292.723330] ? check_same_owner+0x320/0x320 [ 292.727627] ? rcu_note_context_switch+0x710/0x710 [ 292.732537] should_failslab+0xec/0x120 [ 292.736489] kmem_cache_alloc_trace+0x4b/0x740 [ 292.741049] ? __kmalloc_node+0x33/0x70 [ 292.745006] __memcg_init_list_lru_node+0x169/0x270 [ 292.750008] ? list_lru_add+0x7c0/0x7c0 [ 292.753962] ? __kmalloc_node+0x47/0x70 [ 292.757914] __list_lru_init+0x544/0x750 [ 292.761954] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 292.767815] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 292.772810] ? lockdep_init_map+0x9/0x10 [ 292.776847] sget_userns+0x6b1/0xe40 [ 292.780535] ? set_anon_super+0x20/0x20 [ 292.784486] ? put_filp+0x90/0x90 [ 292.787916] ? destroy_unused_super.part.6+0xd0/0xd0 [ 292.792997] ? alloc_vfsmnt+0x762/0x9c0 [ 292.796949] ? path_lookupat+0x238/0xba0 [ 292.800985] ? mnt_free_id.isra.21+0x50/0x50 [ 292.805370] ? trace_hardirqs_off+0x10/0x10 [ 292.809669] ? putname+0xee/0x130 [ 292.813101] ? cap_capable+0x1b5/0x230 [ 292.816967] ? security_capable+0x8e/0xc0 [ 292.821095] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 292.826260] ? ns_capable_common+0xcf/0x160 [ 292.830557] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 292.835720] mount_ns+0x6d/0x190 [ 292.839062] rpc_mount+0x9e/0xd0 [ 292.842407] mount_fs+0x66/0x2d0 [ 292.845749] vfs_kern_mount.part.26+0xc6/0x4a0 [ 292.850307] ? may_umount+0xa0/0xa0 [ 292.853911] ? _raw_read_unlock+0x22/0x30 [ 292.858041] ? __get_fs_type+0x8a/0xc0 [ 292.861905] do_mount+0xea4/0x2bb0 [ 292.865422] ? __might_fault+0x110/0x1d0 [ 292.869458] ? copy_mount_string+0x40/0x40 [ 292.873666] ? check_same_owner+0x320/0x320 [ 292.877967] ? __check_object_size+0x8b/0x530 [ 292.882437] ? __might_sleep+0x95/0x190 [ 292.886391] ? kasan_check_write+0x14/0x20 [ 292.890599] ? _copy_from_user+0x99/0x110 [ 292.894726] ? memdup_user+0x5e/0x90 [ 292.898414] ? copy_mount_options+0x1f7/0x2e0 [ 292.902886] SyS_mount+0xab/0x120 [ 292.906313] ? copy_mnt_ns+0xb30/0xb30 [ 292.910177] do_syscall_64+0x281/0x940 [ 292.914036] ? vmalloc_sync_all+0x30/0x30 [ 292.918156] ? _raw_spin_unlock_irq+0x27/0x70 [ 292.922625] ? finish_task_switch+0x1c1/0x7e0 [ 292.927094] ? syscall_return_slowpath+0x550/0x550 [ 292.931998] ? syscall_return_slowpath+0x2ac/0x550 [ 292.936908] ? prepare_exit_to_usermode+0x350/0x350 [ 292.941904] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 292.947242] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.952065] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.957231] RIP: 0033:0x454e79 [ 292.960393] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:45:52 executing program 1 (fault-call:6 fault-nth:0): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:52 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:52 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000c80)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000a80)='fuse\x00', 0x82, &(0x7f0000000ac0)="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") [ 292.968081] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 292.975327] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 292.982573] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 292.989817] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 292.997062] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002f 2018/03/31 09:45:52 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a3109559f6dcd045929e82c5ba64da2abacdb9e8115eb0eda3bc3974918668e0fe8ff00944f7191fbc3c4ab3d05a15911ae7b6c2d9eb6c7eaed20eccf15795184cf04e889c9274813cde7a248005114d996a80554545bfe920d6fbb073df8cbca1a3fb297db8b18463f632e8834eb278203a6106fbec78e8af2851f22b524202026d077768da263c46ab27b85184bd65774f867819aa23b60d4fa021f21e960646a01e2643a1d5be33fdb3ba36c140d51d3ae27875a27f7be133f29c34556db2558178612b598e29a8b675912c1ec9836f98e4ac7ad231492ba733dfa34a4fd4ee63ba6346cbc2fedf41d3d06fdeace1b650d02624ff94070422e018261bfd431696fc47d9e030ccd2b955659c56d8493f4e603c4efeccd35ad1331c00dd179b00bd823f7b5726b24e4f3b48614c09adac6b834dcd26c8253b6786dcb0d15d28a5c4de52fb15ac764314a8c830bfd42edf5f9dd14ab81be5a1bd49423097868e0185145cd0624ad02f9a4932b51d91d5859eb400759384e66199489512e7d992a80365b34fb4e4232e36037d4f0719c30eb3bc76986bd1bdf18e5d52f73666838d2ff6bbdf8f90803b818ffd06834ae510bb76cbd26a5ce46e02cd8fef30368cc61c92326ea1092521feab08196621a149ea04f7e401f808bac3f1df91f107c6754e9fd93539f815702854f944674d9f2768171d847b2b7d7653a8a7a9ecd9782156476e6b50dc2de2bc882f9480053d5c8766ead614de684a214a1d41b60bdd128095575659a1c47ee425eb44fe6f590566baa172964239b58110edbb9e9beead1d605b959a4257d517aee2a0d5ae56ab980edcbebfeb8a66ecc7fde06035774f64b984be2afdae843472f3a70ac2415bcb7d25bb815fee8c590eeab92e0e90658597f8f78eb33112bc5d28ef2888e47a5ec63f9eac2383052cf2f4c4d42f56b34d4c49090cfd0e9c7ba2ed5818840fee1d854c018f68b167273203cc934ffc890be4e47483fec0ea90eb50cea1a866b727239e2ed799b85d73f0c66a5b68340e51517dd21a3e4ea3d27c43645f667f05fbb6a97368fff565104a5717da6d944f359e5abf6a295f7b3a1def78fab1f6b313cebd00eadccd51e558bc84f2426abec4e88244644e871ebfb2763c1b396b76073d10398792cd6ba2c3c93584d35dbcbfda016d4595118b895170cc6870524f7d43954b2991468ab53fc4feae28c4fda7dfd8ccff7cce43cc425454c8a974c5af90f8838afe488fc74083c0cea5d2feddfae88ce2439e3db7a16026b2cbab0be8c3651fbfb3eea899991dfa4c512ea958a1c1553b2276a7adf533a4a902feb6512e96f124f29ecbd5bde384eea68595027a65be4c5f984bb069f7216e68d58b3d0c5a88096a505a33260e389834506a1cda6343030ab7ee50e13fdd741e66e7cac7f9d9a3d83fdd01257389dad2e3af0ca7962913e92b86e50d50ea52cf7e4fb5f16") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000f80)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001900)={&(0x7f0000001780)=@can={0x0, 0x0}, 0x80, &(0x7f0000001800), 0x0, &(0x7f0000001840)=""/165, 0xa5, 0x3a18}, 0x2000) sendmsg(r1, &(0x7f0000001bc0)={&(0x7f0000001940)=@ll={0x11, 0x1c, r2, 0x1, 0x7, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xd}}, 0x80, &(0x7f0000001b80)=[{&(0x7f00000019c0)="2bdde2afdda12ac5999087e141fc8dbfac27ad2263de91bff917f80ecb7aeb59f2e125d078c990ba4a6b9002b2126f104d3b7612a7b95d016226d9290cb40e32a65eddc28d80bb2c8693afc11b9ba9842701db8348aa1750cda8375361c2965bb33df77643e7ab0c1a3b4b96d0dbec7951dab89092e3c4576e49e57cf8490c94bb0396bef3df435094ce2457a54ccdc945414654802ad4e5cfd621fa5ef588a5edba2e60fb08981660d1f9a9b66cfddcf225096f4ae4a7cb4b7817125be09bfc3d9a8be28c801d", 0xc7}], 0x1, 0x0, 0x0, 0x4008000}, 0x0) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001040)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x400000000008}, 0xfffffffffffffc6f) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000fc0)) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r3, 0x3, 0x8}, 0xc) socketpair(0x10, 0xa, 0x5b0, &(0x7f0000001000)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1f1ef037b3760767cd8c775fa395b6f8bd2d69edde61ea21ffe", 0x4b}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) 2018/03/31 09:45:52 executing program 0 (fault-call:18 fault-nth:48): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) [ 293.146863] FAULT_INJECTION: forcing a failure. [ 293.146863] name failslab, interval 1, probability 0, space 0, times 0 [ 293.158156] CPU: 1 PID: 22189 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 293.165428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.174777] Call Trace: [ 293.177354] dump_stack+0x194/0x24d [ 293.180970] ? arch_local_irq_restore+0x53/0x53 [ 293.185631] should_fail+0x8c0/0xa40 [ 293.189329] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.194412] ? perf_trace_lock+0x900/0x900 [ 293.198627] ? __lock_is_held+0xb6/0x140 [ 293.202670] ? trace_hardirqs_off+0x10/0x10 [ 293.206975] ? find_held_lock+0x35/0x1d0 [ 293.211047] ? check_same_owner+0x320/0x320 [ 293.215349] ? do_raw_spin_trylock+0x190/0x190 [ 293.219922] ? rcu_note_context_switch+0x710/0x710 [ 293.224830] ? lock_release+0xa40/0xa40 [ 293.228788] should_failslab+0xec/0x120 [ 293.232743] kmem_cache_alloc_trace+0x4b/0x740 [ 293.237302] ? tcp_unregister_ulp+0x250/0x250 [ 293.241783] ? ns_capable_common+0xcf/0x160 [ 293.246087] sock_map_alloc+0x232/0x420 [ 293.250043] ? smap_destroy_psock+0x60/0x60 [ 293.254346] SyS_bpf+0x93b/0x4980 [ 293.257779] ? trace_hardirqs_off+0x10/0x10 [ 293.262080] ? __fdget_pos+0x12b/0x190 [ 293.265954] ? bpf_prog_get+0x20/0x20 [ 293.269738] ? trace_event_raw_event_lock+0x340/0x340 [ 293.274912] ? perf_trace_lock+0x900/0x900 [ 293.279130] ? find_held_lock+0x35/0x1d0 [ 293.283177] ? perf_trace_lock+0xd6/0x900 [ 293.287309] ? trace_event_raw_event_lock+0x340/0x340 [ 293.292479] ? _parse_integer+0x140/0x140 [ 293.296611] ? find_held_lock+0x35/0x1d0 [ 293.300653] ? trace_hardirqs_off+0x10/0x10 [ 293.304958] ? get_pid_task+0x93/0x140 [ 293.308827] ? perf_trace_lock+0xd6/0x900 [ 293.312962] ? find_held_lock+0x35/0x1d0 [ 293.317012] ? __f_unlock_pos+0x19/0x20 [ 293.320987] ? lock_downgrade+0x980/0x980 [ 293.325115] ? get_pid_task+0xbc/0x140 [ 293.328984] ? proc_fail_nth_write+0x9b/0x1d0 [ 293.333462] ? map_files_get_link+0x3a0/0x3a0 [ 293.337940] ? handle_mm_fault+0x35b/0xb10 [ 293.342158] ? find_held_lock+0x35/0x1d0 [ 293.346205] ? perf_trace_sys_exit+0x1d3/0x700 [ 293.350770] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 293.355592] ? rcu_pm_notify+0xc0/0xc0 [ 293.359467] ? rcu_read_lock_sched_held+0x108/0x120 [ 293.364462] ? syscall_trace_enter+0x5f5/0x1100 [ 293.369116] ? __bpf_trace_sys_enter+0x30/0x30 [ 293.373684] ? rcu_read_lock_sched_held+0x108/0x120 [ 293.378678] ? syscall_slow_exit_work+0xf2/0x400 [ 293.383415] ? lockdep_sys_exit_thunk+0x35/0x35 [ 293.388065] ? tracehook_report_syscall_exit+0x280/0x280 [ 293.393499] ? SyS_write+0x184/0x220 [ 293.397199] ? do_syscall_64+0xb7/0x940 [ 293.401157] ? bpf_prog_get+0x20/0x20 [ 293.404938] do_syscall_64+0x281/0x940 [ 293.408807] ? vmalloc_sync_all+0x30/0x30 [ 293.412940] ? _raw_spin_unlock_irq+0x27/0x70 [ 293.417413] ? finish_task_switch+0x1c1/0x7e0 [ 293.421888] ? syscall_return_slowpath+0x550/0x550 [ 293.426798] ? syscall_return_slowpath+0x2ac/0x550 [ 293.431711] ? prepare_exit_to_usermode+0x350/0x350 [ 293.436707] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 293.442057] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.446885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 293.452054] RIP: 0033:0x454e79 [ 293.455222] RSP: 002b:00007f24e7a48c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 293.462911] RAX: ffffffffffffffda RBX: 00007f24e7a496d4 RCX: 0000000000454e79 [ 293.470158] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 293.477404] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 293.484651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/03/31 09:45:52 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r3 = getpid() perf_event_open(&(0x7f0000000b00)={0x5, 0x70, 0xb82, 0xb5, 0x8000, 0x5, 0x0, 0x8, 0x2008, 0x9, 0xfffffe0000000000, 0x3, 0x1, 0x5, 0x8182, 0x5, 0xaf, 0x7d8, 0x9, 0x1ff, 0x198, 0xffff, 0x8, 0xffff, 0xff, 0x1, 0x9, 0x3f, 0x7fffffff, 0x4, 0x8, 0x4, 0x3, 0x1, 0x0, 0x5, 0x2a, 0x7ff, 0x0, 0x8, 0x4, @perf_config_ext={0xffff, 0xfff}, 0x10000, 0xfffffffffffffffe, 0x1, 0x7, 0x6, 0x7fffffff, 0xffffffffffff0001}, r3, 0xd, r2, 0x8) r4 = gettid() r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r5, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000ac0)) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r5}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000b80)=0xb0, 0x4) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") perf_event_open(&(0x7f0000000a40)={0x3, 0x70, 0x4, 0x40, 0x5, 0xfffffffffffffffa, 0x0, 0x7, 0x100, 0x4, 0xf3, 0x0, 0x3857, 0x401, 0x80, 0x7fffffff, 0x7462, 0x2, 0x4, 0x7, 0x1000, 0x3, 0x6, 0x6, 0x2, 0x4, 0xffffffffffffffff, 0x7, 0x4, 0x5, 0xc9, 0x10001, 0x1, 0x4, 0x7ff, 0x1, 0x7, 0x1f, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000640)}, 0x0, 0x2, 0x3, 0x7, 0x1, 0xfffffffffffffff8}, r4, 0x8, r0, 0x1) [ 293.491901] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000000 2018/03/31 09:45:52 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c484") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:52 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:52 executing program 1 (fault-call:6 fault-nth:1): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:52 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = gettid() perf_event_open(&(0x7f0000000a80)={0xbec0af8d3ae1ee66, 0x70, 0x4, 0x2, 0x80, 0x9, 0x0, 0x1, 0x400, 0x2, 0x1000, 0x0, 0x1, 0x6, 0x3ff, 0xffff, 0xf, 0x5, 0xfffffffffffffe84, 0x1, 0x100000000, 0x0, 0x4, 0x2, 0x2, 0xfffffffffffffff7, 0x2, 0x8001, 0x4, 0xb5, 0x1, 0x463f492c, 0x2, 0x1ff, 0x0, 0x7, 0x1ff, 0x9, 0x0, 0x46, 0x2, @perf_config_ext={0x200000, 0x2d}, 0x580c, 0x10000, 0xffffffffffffd2c2, 0x0, 0x2, 0x7, 0x7ff}, r2, 0x2, r0, 0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 293.557221] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 293.593155] tmpfs: No value for mount option 'rpc_pipefs' [ 293.602834] autofs4:pid:22199:autofs4_fill_super: called with bogus options [ 293.623496] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 293.648698] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 09:45:52 executing program 4: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000001200)=ANY=[@ANYBLOB="476caaf2fe430e5d7b"]) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000800)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00'}, 0x10) mount(&(0x7f0000000e80)='./file1/file0\x00', &(0x7f0000000ec0)='./file1\x00', &(0x7f0000001180)='v7\x00', 0xa0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000c80)="da4b7699214c0fda0d9296bcb126159cc5992ff7874d9dede985e13f4a2bb1278594c5ca50fb5392afdda6b9056ed9f3d8df3f76dc3b35a56ee9357e87c1fe00b79c4747d65280b3f6eed21d461432a25641c1cf2662f8923f376489c58a7724e9299ad0fdadda9721561a98738d09a417a460c8e6b60e52ed25b948bc24601bc89ff5ea6fadda30e3a9c0c338f652cd57e48a550190c55437521150fbadcd67e351c43e75eab553bf22c621e9ce", &(0x7f0000000d40)=""/226}, 0x18) mkdir(&(0x7f00000003c0)='./file1/file0\x00', 0x1) bpf$OBJ_GET_PROG(0x7, &(0x7f00000008c0)={&(0x7f0000000880)='./file1\x00', 0x0, 0x8}, 0xfffffc65) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file0/file0\x00', 0x0, 0x18}, 0xffffff45) mount(&(0x7f0000000a80)='./file1\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000b00)='msdos\x00', 0x100000, &(0x7f0000000b40)="fa30608f0c90725e59036de98350533dbbe7792fd0ae69b4c65f5e29e7b2e58831400e5be3dfd2ab3095e957caf97d493ef64311e4b8d42595b3c70a39523a67c8e1bbaf7be36291b0e43503599de4dcebd0b9a39976a1cec274c795e034bfc6af877fcd58fe801280629bcbed7814dddcb67845aa58dbc3bedad5aa669702eab32ac8b7da93fcf7c99a78d71ab693ee94c04d18c410f152a63200a13b84e0500edb9b0be76a6c3aa27c418dcfd9a55435ded3cd7de0cdca4f47faf531f75f2289d2a5903e0b6ceb7ff9987aed031ffc839febce3a0d1e3ffee9c419ac80b3e3a08543c860e8579a0c56f7a2d84cce5bc7ef740c5c") recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004640)={&(0x7f0000003180)=@hci={0x0, 0x0}, 0x80, &(0x7f00000044c0)=[{&(0x7f0000003200)=""/4096, 0xfffffffffffffef0}, {&(0x7f0000004200)=""/162, 0xa2}, {&(0x7f00000042c0)=""/124, 0x7c}, {&(0x7f0000004340)=""/178, 0xb2}, {&(0x7f0000004400)=""/161, 0xa1}], 0x5, &(0x7f0000004540)=""/252, 0xfc, 0x100}, 0x40010121) bpf$OBJ_GET_PROG(0x7, &(0x7f00000011c0)={&(0x7f0000000a00)='./file2\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000004680)={0x7, 0x8, &(0x7f0000000840)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, @generic={0x0, 0x66e9, 0xffff, 0x6}, @exit={0x95}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xb54}], &(0x7f0000000900)='GPL\x00', 0x400, 0xbd, &(0x7f0000000940)=""/189, 0x41100, 0x1, [], r1}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)='configfs\x00', 0x8000, 0x0) mount(&(0x7f0000000400)='./file2\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000e40)='omfs\x00', 0x2101800, &(0x7f0000001080)="95444893c0189c6c9a3a4b184d226ba14c89dcde96a5415d62b8853678f187c479a0cbfe14194cdfca7aa23669b908c9054866eab2b8e570c35ec4319020b5eaa597f505bf5be68571bf761ce93bf4a3d94b6472341bd9fd2601e3032dbc79cf3a62c2d483764dc3b49e96c244e272de94eab53caa3703c8b0a3f739d2d65807c65c0a0bf2d24348177cec7e57a6780b0aaf3f788ec8da7ca8501b33f18a49822921ff32acb4fa536aad78f2f450145a9e4f649132269e8f8e8f386003ed692ef9afef0cece1e89ea4febead6ed2815675ed98426b8e9e375062f69da98fdedce41c") mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000002340)={&(0x7f0000000f00)=@ethernet={0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000f80)="d2e492e9c89077f9476e62f92a443b916e62b283899e7763e32c693301a5213e56d5ecff01d1ec43d5f24cb01e431a1635d084b29ed9d1351348beacc87471f0bd8808d3cac6e2d380b54f31bf117268a891c7a7f24259bfd1763bb2265206290c30fc070891fc94e9a3d46a989518e9be8a3b9a5abee6bff07c747aaf23d95e1d778e0380a46ba75d7c53b109c21da0e59ead45a01e921df24d1b646f0fd4ab7f0e42f5bbd1986710998ebb0ceee51846a779d7be8bd17e2e3cbaca6004dbe96f15058a0fb02cddc04e129822d6c05037437a5981effe5344fc2e48eac65b32f7a2453de9", 0xe5}], 0x1, &(0x7f0000004700)=[{0xc0, 0x12b, 0x1, "7f30a29d921abef1d7bda65a472cce35f0b972f42b6b8e6fb737f2bf240200692ab64fbe80a8260d58f322095df2d571969fc8be52c30377c713c8cbb20dc89fdd9f66fc4cb4f34448faeee8314610ff36186ae6547207c520e57fa31ee3fe84fd1d5805bed451b3b04aad0ca7b486b2d65b7c56191a120862af65aeb9ec4d7237251eae0d91b7ab05858a90aa8700445282cd4e071ffd63aed27374843eef5035c1fbea30c138f89857d86a7e38"}], 0xc0}, 0x20004000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000c40)) mount(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)='msdos\x00', 0x40000, &(0x7f0000000640)="7e925ef82387ea6886d3c8f6271152a2232eeb0e1a366d29b97ad09908fa54f79fa3d25b4de5371cdd3734d587cb332f27f25ce3f41239ea1b8b705fa2869062badfe2e171b0a5e054c4bad758f06cd463212dd4105fcd741307398a94e84d1ec5a5ee27687fc2fd2e85c88ec27373947dfeb11c209b9e06620e5c8badbe3625b4d2c47d1fbb935722d501c8e16f1eead7de1b1a90239701d698aa3e83c4dd4d2a51cc77876f75de651a70a0173ed671e87bf6d74f20d5a87d842830d3de4ea2924780e2f2a2b56108882a3281a6c769") [ 293.657534] FAULT_INJECTION: forcing a failure. [ 293.657534] name failslab, interval 1, probability 0, space 0, times 0 [ 293.657747] autofs4:pid:22207:autofs4_fill_super: called with bogus options [ 293.668816] CPU: 1 PID: 22203 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 293.668827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.692512] Call Trace: [ 293.695106] dump_stack+0x194/0x24d [ 293.698737] ? arch_local_irq_restore+0x53/0x53 [ 293.703404] ? __save_stack_trace+0x7e/0xd0 [ 293.707729] should_fail+0x8c0/0xa40 [ 293.711446] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 293.716548] ? kasan_kmalloc+0xad/0xe0 [ 293.720437] ? kmem_cache_alloc_trace+0x136/0x740 [ 293.725275] ? __memcg_init_list_lru_node+0x169/0x270 [ 293.730463] ? __list_lru_init+0x544/0x750 [ 293.734697] ? sget_userns+0x6b1/0xe40 [ 293.738585] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 293.743342] ? do_mount+0xea4/0x2bb0 [ 293.747056] ? SyS_mount+0xab/0x120 [ 293.750683] ? do_syscall_64+0x281/0x940 [ 293.754740] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 293.760099] ? find_held_lock+0x35/0x1d0 [ 293.764164] ? __lock_is_held+0xb6/0x140 [ 293.768218] ? check_same_owner+0x320/0x320 [ 293.772538] ? rcu_note_context_switch+0x710/0x710 [ 293.777466] should_failslab+0xec/0x120 [ 293.781424] kmem_cache_alloc_trace+0x4b/0x740 [ 293.786068] ? __kmalloc_node+0x33/0x70 [ 293.790022] ? __kmalloc_node+0x33/0x70 [ 293.793977] ? rcu_read_lock_sched_held+0x108/0x120 [ 293.798971] __memcg_init_list_lru_node+0x169/0x270 [ 293.803963] ? list_lru_add+0x7c0/0x7c0 [ 293.807910] ? __kmalloc_node+0x47/0x70 [ 293.811862] __list_lru_init+0x544/0x750 [ 293.815901] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 293.821763] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 293.826755] ? lockdep_init_map+0x9/0x10 [ 293.830790] sget_userns+0x6b1/0xe40 [ 293.834478] ? set_anon_super+0x20/0x20 [ 293.838430] ? put_filp+0x90/0x90 [ 293.841863] ? destroy_unused_super.part.6+0xd0/0xd0 [ 293.846942] ? alloc_vfsmnt+0x762/0x9c0 [ 293.850891] ? path_lookupat+0x238/0xba0 [ 293.854933] ? mnt_free_id.isra.21+0x50/0x50 [ 293.859325] ? trace_hardirqs_off+0x10/0x10 [ 293.863624] ? putname+0xee/0x130 [ 293.867055] ? cap_capable+0x1b5/0x230 [ 293.870923] ? security_capable+0x8e/0xc0 [ 293.875051] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 293.880215] ? ns_capable_common+0xcf/0x160 [ 293.884520] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 293.889682] mount_ns+0x6d/0x190 [ 293.893033] rpc_mount+0x9e/0xd0 [ 293.896374] mount_fs+0x66/0x2d0 [ 293.899715] vfs_kern_mount.part.26+0xc6/0x4a0 [ 293.904270] ? may_umount+0xa0/0xa0 [ 293.907874] ? _raw_read_unlock+0x22/0x30 [ 293.911999] ? __get_fs_type+0x8a/0xc0 [ 293.915871] do_mount+0xea4/0x2bb0 [ 293.919384] ? __might_fault+0x110/0x1d0 [ 293.923422] ? copy_mount_string+0x40/0x40 [ 293.927632] ? check_same_owner+0x320/0x320 [ 293.931930] ? __check_object_size+0x8b/0x530 [ 293.936402] ? __might_sleep+0x95/0x190 [ 293.940356] ? kasan_check_write+0x14/0x20 [ 293.944569] ? _copy_from_user+0x99/0x110 [ 293.948697] ? memdup_user+0x5e/0x90 [ 293.952384] ? copy_mount_options+0x1f7/0x2e0 [ 293.956854] SyS_mount+0xab/0x120 [ 293.960282] ? copy_mnt_ns+0xb30/0xb30 [ 293.964146] do_syscall_64+0x281/0x940 [ 293.968010] ? vmalloc_sync_all+0x30/0x30 [ 293.972135] ? _raw_spin_unlock_irq+0x27/0x70 [ 293.976608] ? finish_task_switch+0x1c1/0x7e0 [ 293.981077] ? syscall_return_slowpath+0x550/0x550 [ 293.985984] ? syscall_return_slowpath+0x2ac/0x550 [ 293.990887] ? prepare_exit_to_usermode+0x350/0x350 [ 293.995882] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 294.001228] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.006052] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 294.011215] RIP: 0033:0x454e79 [ 294.014379] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.022065] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 294.029311] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 294.036554] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 294.043799] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 294.051045] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000030 [ 294.101210] FAULT_INJECTION: forcing a failure. [ 294.101210] name failslab, interval 1, probability 0, space 0, times 0 [ 294.112544] CPU: 0 PID: 22220 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #43 [ 294.119816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.129167] Call Trace: [ 294.131757] dump_stack+0x194/0x24d [ 294.135376] ? arch_local_irq_restore+0x53/0x53 [ 294.140042] should_fail+0x8c0/0xa40 [ 294.143755] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.148853] ? save_stack+0x43/0xd0 [ 294.152462] ? kasan_kmalloc+0xad/0xe0 [ 294.156323] ? kmem_cache_alloc_trace+0x136/0x740 [ 294.161152] ? sock_map_alloc+0x232/0x420 [ 294.165292] ? find_held_lock+0x35/0x1d0 [ 294.169361] ? check_same_owner+0x320/0x320 [ 294.173675] ? rcu_note_context_switch+0x710/0x710 [ 294.178586] should_failslab+0xec/0x120 [ 294.182542] kmem_cache_alloc_node_trace+0x5a/0x760 [ 294.187545] ? bpf_map_init_from_attr+0x320/0x320 [ 294.192371] __kmalloc_node+0x33/0x70 [ 294.196152] bpf_map_area_alloc+0x32/0x80 [ 294.200282] sock_map_alloc+0x37a/0x420 [ 294.204235] ? smap_destroy_psock+0x60/0x60 [ 294.208532] SyS_bpf+0x93b/0x4980 [ 294.211965] ? trace_hardirqs_off+0x10/0x10 [ 294.216263] ? __fdget_pos+0x12b/0x190 [ 294.220135] ? bpf_prog_get+0x20/0x20 [ 294.223914] ? trace_event_raw_event_lock+0x340/0x340 [ 294.229079] ? find_held_lock+0x35/0x1d0 [ 294.233132] ? perf_trace_lock+0xd6/0x900 [ 294.237267] ? trace_event_raw_event_lock+0x340/0x340 [ 294.242447] ? _parse_integer+0x140/0x140 [ 294.246577] ? check_same_owner+0x320/0x320 [ 294.250879] ? find_held_lock+0x35/0x1d0 [ 294.254917] ? trace_hardirqs_off+0x10/0x10 [ 294.259223] ? get_pid_task+0x93/0x140 [ 294.263087] ? perf_trace_lock+0xd6/0x900 [ 294.267213] ? find_held_lock+0x35/0x1d0 [ 294.271262] ? __f_unlock_pos+0x19/0x20 [ 294.275220] ? lock_downgrade+0x980/0x980 [ 294.279348] ? get_pid_task+0xbc/0x140 [ 294.283223] ? proc_fail_nth_write+0x9b/0x1d0 [ 294.287699] ? map_files_get_link+0x3a0/0x3a0 [ 294.292169] ? find_held_lock+0x35/0x1d0 [ 294.296216] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 294.301044] ? vfs_write+0x374/0x510 [ 294.304733] ? wait_for_completion+0x770/0x770 [ 294.309310] ? __sb_end_write+0xa0/0xd0 [ 294.313262] ? fput+0xd2/0x140 [ 294.316428] ? SyS_write+0x184/0x220 [ 294.320138] ? do_syscall_64+0xb7/0x940 [ 294.324094] ? bpf_prog_get+0x20/0x20 [ 294.327869] do_syscall_64+0x281/0x940 [ 294.331740] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 294.337251] ? syscall_return_slowpath+0x550/0x550 [ 294.342156] ? syscall_return_slowpath+0x2ac/0x550 [ 294.347066] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 294.352412] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.357236] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 294.362397] RIP: 0033:0x454e79 [ 294.365562] RSP: 002b:00007f24e7a48c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 294.373244] RAX: ffffffffffffffda RBX: 00007f24e7a496d4 RCX: 0000000000454e79 [ 294.380487] RDX: 000000000000002c RSI: 0000000020000080 RDI: 0000000000000000 [ 294.387737] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 294.394996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 294.402250] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000001 2018/03/31 09:45:53 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1000) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x40) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\x00') 2018/03/31 09:45:53 executing program 0 (fault-call:18 fault-nth:49): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:53 executing program 1 (fault-call:6 fault-nth:2): r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:53 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() bpf$MAP_CREATE(0x0, &(0x7f0000000880)={0x0, 0x6984d0b9, 0xffd5, 0x7ff, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000640)={0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000000f00)={&(0x7f0000000a40)=@vsock={0x0, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000ac0)=""/98, 0x62}, {&(0x7f0000000b40)=""/157, 0x9d}, {&(0x7f0000000c00)=""/250, 0x417}, {&(0x7f0000000d00)=""/130, 0x82}, {&(0x7f0000000dc0)=""/149, 0x95}], 0x5, &(0x7f0000001600)=""/4096, 0x1000, 0x4001}, 0x40) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000f40)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41f00, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:53 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) mount(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000b00)='f2fs\x00', 0x50001, &(0x7f0000000b40)="9fdedf3161b6ba996ae176992bcacae9ec8060edbe5991bb87a6c83dc8e965a75836d706255f0f297fe031c9c2589e63194336d2fb4564bd75c86bcd49537af993e37957b5280f108916ad3f38a86104d7ca2cb68e3094896546203b9c81e645811adadb02c1d1e6dd74f4f9c272b53c6804f72217da1e1bc8a795e9ed17f40951a4d1645e3066e3aafe929e43fd") bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x800}, [], {0x95}}, &(0x7f0000000c00)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x121) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:53 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$MAP_CREATE(0x18, &(0x7f000000c000)={0x0, 0x0, 0x0, 0x0, 0x10, r0}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r1, 0x28, &(0x7f0000000080)}, 0x10) 2018/03/31 09:45:53 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:53 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c484") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:53 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c484") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:53 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 294.714000] FAULT_INJECTION: forcing a failure. [ 294.714000] name failslab, interval 1, probability 0, space 0, times 0 [ 294.725335] CPU: 1 PID: 22248 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 294.732607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.741950] Call Trace: [ 294.744532] dump_stack+0x194/0x24d [ 294.748164] ? arch_local_irq_restore+0x53/0x53 [ 294.752916] ? __save_stack_trace+0x7e/0xd0 [ 294.757227] should_fail+0x8c0/0xa40 [ 294.760925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 294.766013] ? kasan_kmalloc+0xad/0xe0 [ 294.769882] ? kmem_cache_alloc_trace+0x136/0x740 [ 294.774703] ? __memcg_init_list_lru_node+0x169/0x270 [ 294.779866] ? __list_lru_init+0x544/0x750 [ 294.784074] ? sget_userns+0x6b1/0xe40 [ 294.787940] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 294.792671] ? do_mount+0xea4/0x2bb0 [ 294.796357] ? SyS_mount+0xab/0x120 [ 294.799962] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 294.805308] ? find_held_lock+0x35/0x1d0 [ 294.809351] ? __lock_is_held+0xb6/0x140 [ 294.813395] ? check_same_owner+0x320/0x320 [ 294.817702] ? rcu_note_context_switch+0x710/0x710 [ 294.822613] should_failslab+0xec/0x120 [ 294.826565] kmem_cache_alloc_trace+0x4b/0x740 [ 294.831126] ? __kmalloc_node+0x33/0x70 [ 294.835079] ? __kmalloc_node+0x33/0x70 [ 294.839033] ? rcu_read_lock_sched_held+0x108/0x120 [ 294.844034] __memcg_init_list_lru_node+0x169/0x270 [ 294.849034] ? list_lru_add+0x7c0/0x7c0 [ 294.852986] ? __kmalloc_node+0x47/0x70 [ 294.856940] __list_lru_init+0x544/0x750 [ 294.860984] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 294.866847] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 294.871844] ? lockdep_init_map+0x9/0x10 [ 294.875883] sget_userns+0x6b1/0xe40 [ 294.879573] ? set_anon_super+0x20/0x20 [ 294.883529] ? put_filp+0x90/0x90 [ 294.886962] ? destroy_unused_super.part.6+0xd0/0xd0 [ 294.892046] ? alloc_vfsmnt+0x762/0x9c0 [ 294.895994] ? path_lookupat+0x238/0xba0 [ 294.900039] ? mnt_free_id.isra.21+0x50/0x50 [ 294.904427] ? trace_hardirqs_off+0x10/0x10 [ 294.908726] ? putname+0xee/0x130 [ 294.912161] ? cap_capable+0x1b5/0x230 [ 294.916035] ? security_capable+0x8e/0xc0 [ 294.920161] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 294.925330] ? ns_capable_common+0xcf/0x160 [ 294.929630] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 294.934796] mount_ns+0x6d/0x190 [ 294.938140] rpc_mount+0x9e/0xd0 [ 294.941485] mount_fs+0x66/0x2d0 [ 294.944830] vfs_kern_mount.part.26+0xc6/0x4a0 [ 294.949390] ? may_umount+0xa0/0xa0 [ 294.952999] ? _raw_read_unlock+0x22/0x30 [ 294.957133] ? __get_fs_type+0x8a/0xc0 [ 294.961003] do_mount+0xea4/0x2bb0 [ 294.964527] ? __might_fault+0x110/0x1d0 [ 294.968569] ? copy_mount_string+0x40/0x40 [ 294.972783] ? __check_object_size+0x8b/0x530 [ 294.977258] ? __might_sleep+0x95/0x190 [ 294.981213] ? kasan_check_write+0x14/0x20 [ 294.985425] ? _copy_from_user+0x99/0x110 [ 294.989553] ? memdup_user+0x5e/0x90 [ 294.993240] ? copy_mount_options+0x1f7/0x2e0 [ 294.997712] SyS_mount+0xab/0x120 [ 295.001140] ? copy_mnt_ns+0xb30/0xb30 [ 295.005005] do_syscall_64+0x281/0x940 [ 295.008873] ? vmalloc_sync_all+0x30/0x30 [ 295.012997] ? _raw_spin_unlock_irq+0x27/0x70 [ 295.017473] ? finish_task_switch+0x1c1/0x7e0 [ 295.021945] ? syscall_return_slowpath+0x550/0x550 [ 295.026856] ? syscall_return_slowpath+0x2ac/0x550 [ 295.031761] ? prepare_exit_to_usermode+0x350/0x350 [ 295.036756] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 295.042099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.046923] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 295.052087] RIP: 0033:0x454e79 [ 295.055251] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:45:54 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000500)=""/111, 0x6f}, {&(0x7f0000000580)=""/108, 0x6c}], 0x2, &(0x7f0000000640)=""/139, 0x8b, 0x182a}, 0x10000) r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, @perf_bp, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x6, 0x4, 0x6879, 0xb, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000180)) mkdir(&(0x7f0000000040)='.', 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYRES32]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) r3 = getpid() perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0xff, 0x9, 0x8f, 0x6, 0x0, 0x6, 0x1000, 0xc, 0x3, 0x20, 0x1, 0x7, 0x6, 0x1, 0x6, 0x9, 0x9, 0x80000001, 0x9e8, 0x0, 0x3fc2, 0x7, 0x4, 0x7ff, 0x3ff, 0x2, 0xb1c1, 0x100, 0x6, 0x1, 0x5, 0xdb49, 0x1000, 0xa4, 0x4, 0x0, 0x0, 0x8, 0x5, @perf_config_ext={0xe11, 0x6c61}, 0x1008, 0x1, 0x1, 0x1, 0x5, 0x5}, r3, 0x0, r2, 0x1) mount(&(0x7f00000001c0)='.', &(0x7f00000002c0)='.', &(0x7f0000000300)='affs\x00', 0x84820, &(0x7f0000000340)="57963d4b06875ec6047c8c99ef2def38601755674c8025f91fd02ce5fb1f7415b8e1dfa116d6f97375ccfa890fc46088ceaf5135c5d793bbf60196460732b673b77fafc7431c84602d385a35bab59ccca28311") perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x3, 0x5, 0xfffffffffffffffb, 0x9, 0x0, 0x2, 0x400, 0x5, 0x40, 0x8, 0x100000000, 0x9, 0x7ff, 0x1, 0x8000, 0x9, 0x0, 0x70a, 0x8, 0x4, 0x400, 0x500b, 0x7, 0x8000, 0x3, 0x1, 0x8, 0x4, 0x2, 0x5, 0x1, 0x400, 0x0, 0x157, 0x3, 0x9, 0x0, 0xd44, 0x1, @perf_config_ext={0x1ff, 0x3}, 0x20, 0x1, 0x7, 0x7, 0x58b, 0x3f, 0x3}, r3, 0x2, r1, 0x1) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r2, &(0x7f0000000340)}, 0x10) mount(&(0x7f00000003c0)='.', &(0x7f0000000400)='.', &(0x7f0000000440)='nsfs\x00', 0x20000, &(0x7f0000000480)="db7a64990bcf1371320ec072c8e0e1d6f04d0c2fbef233") [ 295.062937] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 295.070184] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 295.077428] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 295.084673] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 295.091917] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000031 2018/03/31 09:45:54 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000a80)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000e00)={&(0x7f0000000ac0)=@nfc, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000b40)=""/227, 0xe3}, {&(0x7f0000000c40)=""/87, 0x57}], 0x2, &(0x7f0000000d00)=""/196, 0xc4, 0x3}, 0x1) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 0 (fault-call:18 fault-nth:50): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:54 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x6, 0x6, 0x100000000, 0x3, 0x0, 0x2, 0x0, 0x0, 0x9, 0x54, 0x1444, 0x1d, 0x3fffffffc0, 0x1, 0x0, 0x70, 0x1, 0x100000001, 0xfe46, 0x0, 0xff, 0x3, 0x5, 0x23, 0x6, 0x0, 0x6, 0x7fffffff, 0x8, 0x3ff, 0x7, 0xffffffffffffffc1, 0x3, 0x3, 0x8, 0x45e, 0x0, 0x6, 0x6, @perf_config_ext={0x6, 0xff}, 0x2, 0x8524, 0x2, 0x5, 0xd37, 0x5, 0x7}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x200, 0x8, 0x4, 0x0, 0x0, 0x8, 0xb, 0x6, 0x3, 0x4, 0x0, 0x2, 0x1, 0x6a, 0xb46d, 0x33, 0x1, 0x1000, 0x7, 0x7fff, 0x80000000, 0x9, 0x7ff, 0x400, 0x8, 0x80000000, 0x80000001, 0xffff, 0xe1, 0x2, 0x758, 0x1ff, 0x3ee1, 0x2, 0x2400000000000, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0xa208, 0xdd, 0x0, 0x1, 0xe6, 0xffffffffffff57be, 0x401}, r0, 0x8, r1, 0x8) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x0, &(0x7f0000444000)) 2018/03/31 09:45:54 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000bc0)='./file0\x00', &(0x7f0000000b80)='ocfs2_dlmfs\x00', 0x2000000, &(0x7f0000000ac0)="8de7d166691a557f267b9dbd2b5148648bead6161a16a2a7ec394f560a5cad7bcd2c286bcb6872b71e16ca419570c6a444b41239380d87400a3c9220f6fa3a4c52dc0f120378ccf247491709d71b") bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 295.335240] FAULT_INJECTION: forcing a failure. [ 295.335240] name failslab, interval 1, probability 0, space 0, times 0 [ 295.346523] CPU: 1 PID: 22279 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 295.353789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.363142] Call Trace: [ 295.365734] dump_stack+0x194/0x24d [ 295.369374] ? arch_local_irq_restore+0x53/0x53 [ 295.374044] ? __save_stack_trace+0x7e/0xd0 [ 295.378382] should_fail+0x8c0/0xa40 [ 295.382107] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.387206] ? kasan_kmalloc+0xad/0xe0 [ 295.391091] ? kmem_cache_alloc_trace+0x136/0x740 [ 295.395934] ? __memcg_init_list_lru_node+0x169/0x270 [ 295.401120] ? __list_lru_init+0x544/0x750 [ 295.405352] ? sget_userns+0x6b1/0xe40 [ 295.409252] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 295.414006] ? do_mount+0xea4/0x2bb0 [ 295.417707] ? SyS_mount+0xab/0x120 [ 295.421327] ? do_syscall_64+0x281/0x940 [ 295.425400] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 295.430771] ? find_held_lock+0x35/0x1d0 [ 295.434822] ? __lock_is_held+0xb6/0x140 [ 295.438872] ? check_same_owner+0x320/0x320 [ 295.443193] ? rcu_note_context_switch+0x710/0x710 [ 295.448117] should_failslab+0xec/0x120 [ 295.452084] kmem_cache_alloc_trace+0x4b/0x740 [ 295.456661] ? __kmalloc_node+0x33/0x70 [ 295.460632] ? __kmalloc_node+0x33/0x70 [ 295.464609] ? rcu_read_lock_sched_held+0x108/0x120 [ 295.469627] __memcg_init_list_lru_node+0x169/0x270 [ 295.474646] ? list_lru_add+0x7c0/0x7c0 [ 295.478617] ? __kmalloc_node+0x47/0x70 [ 295.482593] __list_lru_init+0x544/0x750 [ 295.486658] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 295.492545] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 295.497570] ? lockdep_init_map+0x9/0x10 [ 295.501630] sget_userns+0x6b1/0xe40 [ 295.505339] ? set_anon_super+0x20/0x20 [ 295.509317] ? put_filp+0x90/0x90 [ 295.512765] ? destroy_unused_super.part.6+0xd0/0xd0 [ 295.517860] ? alloc_vfsmnt+0x762/0x9c0 [ 295.521828] ? path_lookupat+0x238/0xba0 [ 295.525885] ? mnt_free_id.isra.21+0x50/0x50 [ 295.530290] ? trace_hardirqs_off+0x10/0x10 [ 295.534606] ? putname+0xee/0x130 [ 295.538059] ? cap_capable+0x1b5/0x230 [ 295.541949] ? security_capable+0x8e/0xc0 [ 295.546094] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 295.551277] ? ns_capable_common+0xcf/0x160 [ 295.555601] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 295.560791] mount_ns+0x6d/0x190 [ 295.564162] rpc_mount+0x9e/0xd0 [ 295.567527] mount_fs+0x66/0x2d0 [ 295.570891] vfs_kern_mount.part.26+0xc6/0x4a0 [ 295.575468] ? may_umount+0xa0/0xa0 [ 295.579093] ? _raw_read_unlock+0x22/0x30 [ 295.583229] ? __get_fs_type+0x8a/0xc0 [ 295.587106] do_mount+0xea4/0x2bb0 [ 295.590629] ? __might_fault+0x110/0x1d0 [ 295.594666] ? copy_mount_string+0x40/0x40 [ 295.598876] ? check_same_owner+0x320/0x320 [ 295.603171] ? __check_object_size+0x8b/0x530 [ 295.607642] ? __might_sleep+0x95/0x190 [ 295.611593] ? kasan_check_write+0x14/0x20 [ 295.615802] ? _copy_from_user+0x99/0x110 [ 295.619928] ? memdup_user+0x5e/0x90 [ 295.623616] ? copy_mount_options+0x1f7/0x2e0 [ 295.628089] SyS_mount+0xab/0x120 [ 295.631529] ? copy_mnt_ns+0xb30/0xb30 [ 295.635398] do_syscall_64+0x281/0x940 [ 295.639264] ? vmalloc_sync_all+0x30/0x30 [ 295.643397] ? _raw_spin_unlock_irq+0x27/0x70 [ 295.647869] ? finish_task_switch+0x1c1/0x7e0 [ 295.652337] ? syscall_return_slowpath+0x550/0x550 [ 295.657246] ? syscall_return_slowpath+0x2ac/0x550 [ 295.662152] ? prepare_exit_to_usermode+0x350/0x350 [ 295.667158] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 295.672508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.677332] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 295.682498] RIP: 0033:0x454e79 [ 295.685661] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.693346] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 295.700589] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 295.707839] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 295.715091] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 295.722343] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000032 2018/03/31 09:45:54 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af9") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") socketpair(0x1b, 0x0, 0x2, &(0x7f0000000640)) gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c40)={&(0x7f0000000c00)='./file0\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000640)={r2, &(0x7f0000000a40)="0c350100eaed6b83d94e77cc84f2267562ea8e8712e38d81f810d4e4d2ea667dec3844f66277367e73a3b57c0e2982a0501f2c3b72d8fc1f477ad109a1b8596b31f224cece7ccc6b45b0d53cee7c48ff47796e51c6357141dae0ea256522627df60c37c95b2172d46625fd18f33a443aa022f4c8609c1660bdc0669ea3ee11d0ff9af8085239bf3c931d81585b6ff0521fbec89ed5fab48ca14993c9ab792bae7e7da6578f8824ef6eca12b6edacbe1831825cfaec899cbc57c51e3312bae01fcdcd9c46e82e4e813acbfb0b107c3d5fdd8f71", &(0x7f0000000b40)=""/148}, 0x18) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000f40)={&(0x7f0000000cc0)=@can, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000d40)=""/253, 0xfd}], 0x1, &(0x7f0000000e80)=""/131, 0x83, 0x6}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:54 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r2 = gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) perf_event_open(&(0x7f0000000ac0)={0x0, 0x70, 0x4, 0x7fff, 0xfffffffffffffe5a, 0x24, 0x0, 0x4, 0x8, 0x8, 0x1, 0x4, 0xffffffff, 0x5, 0x0, 0x0, 0x2, 0x1, 0x1, 0x295, 0xeed, 0x5, 0x8, 0x5, 0x3, 0x401, 0xffffffffffff6fe8, 0x36, 0x80000001, 0x8, 0x7, 0x45ca, 0x85, 0x101, 0x1, 0x80, 0x8, 0xdf35, 0x0, 0x1fa, 0x5, @perf_bp={&(0x7f0000000a80), 0x8}, 0x100, 0x6e628ba2, 0x8000, 0x5, 0x9, 0x40, 0x80}, r2, 0xf, r0, 0x2) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x6, 0xe, &(0x7f0000000b40)=@raw=[@ldst={0x3, 0x1, 0x2, 0x7, 0x7, 0xc, 0x4}, @generic={0xfffffffffffffffc, 0x5, 0xab1, 0x4}, @alu={0x4, 0x4, 0xa, 0x3, 0xe, 0xfffffff8, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2f}, @ldst={0x1, 0x0, 0x1, 0x0, 0xf, 0xfffffff0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x21}, @jmp={0x5, 0xfaf, 0x2, 0x9, 0x5, 0xfffffffe, 0x11}], &(0x7f0000000ec0)='GPL\x00', 0x100000000, 0xa0, &(0x7f0000000c00)=""/160, 0x40f00, 0x1}, 0x48) sendmsg$kcm(r0, &(0x7f0000000e80)={&(0x7f0000000d40)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha256-avx\x00'}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000dc0)="0def84157eb91faff0dd8158b3eb17c0c8f29f1326c7834aded48b7f08916a9ebb181c", 0x23}, {&(0x7f0000000e00)="18f93e07407b6b20011523", 0xb}], 0x2, 0x0, 0x0, 0xedba53d546168579}, 0x20000000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfffffffffffffffb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x7fff, 0xfb, &(0x7f0000000140)=""/251}, 0x48) 2018/03/31 09:45:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x936b, 0x8, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x0, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x0, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r3, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000c00)='./file0\x00', r1}, 0xffffffffffffff09) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000300)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) recvmsg(r2, &(0x7f0000001480)={&(0x7f0000000f80)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000001000)=""/237, 0xed}, {&(0x7f0000001100)=""/19, 0x13}, {&(0x7f0000001140)=""/55, 0x37}, {&(0x7f0000001180)=""/57, 0x39}, {&(0x7f00000011c0)=""/72, 0x48}, {&(0x7f0000001240)=""/79, 0x4f}, {&(0x7f00000012c0)=""/213, 0xd5}], 0x7, &(0x7f0000001440)=""/30, 0x1e, 0x5}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x2, &(0x7f0000000600)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5f5, 0x0, 0x0, 0x0, 0x7}, [], {0x95}}, &(0x7f0000000340)='syzkaller\x00', 0x20, 0xfffffffffffffd66, &(0x7f0000000c40)=""/155, 0x41000, 0x1, [], r5}, 0x48) mount(&(0x7f0000000680)='./file0/file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r3, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f0000000800)=""/161}, 0x18) r6 = gettid() perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x117e, 0x406, 0x0, 0x5, 0x0, 0xfffffffffffffffa, 0x2001, 0x0, 0x48, 0x3, 0x6, 0x0, 0x9, 0xd8e, 0x3, 0x1, 0x72, 0x0, 0x8, 0x3, 0x5, 0x1, 0x0, 0xf000000000000000, 0x0, 0x0, 0x10001, 0x400, 0x1, 0x3, 0x1, 0x0, 0x30, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x210, 0x8, 0x20000007, 0x4, 0x80000000, 0x2, 0x2}, r6, 0xe, 0xffffffffffffffff, 0x1) 2018/03/31 09:45:54 executing program 0 (fault-call:18 fault-nth:51): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:54 executing program 4: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000002940)={0xa, 0x4, &(0x7f0000002880)=@raw=[@generic={0x1000, 0x3, 0x77aa, 0x20}, @call={0x85, 0x0, 0x0, 0x23}], &(0x7f00000028c0)='GPL\x00', 0xbd7, 0xd, &(0x7f0000002900)=""/13, 0x41f00, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={r0, 0x50, &(0x7f0000002800)={0x0, 0x0}}, 0xfe5c) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r1, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002a40)={0xffffffffffffffff}) recvmsg(r3, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000fc0)='rpc_pipefs\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r4 = socket$kcm(0x29, 0x7, 0x0) recvmsg(r4, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff, 0x800, 0x4000000000000}, 0x2c) close(r3) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r5}, 0x10) mkdir(&(0x7f0000001000)='./file0/', 0xfffffffffffffffe) r6 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000b00)='./file0//file0\x00', &(0x7f0000002600)='./file0/', &(0x7f0000002640)='binfmt_misc\x00', 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) sendmsg(r3, &(0x7f0000002780)={&(0x7f0000002680)=@nfc={0x27, 0x1, 0x0, 0x7}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000002700)="97df2b949dba695e474c8fcfa568c676ea8c32e2685a430136feb11db67b41b196ce9ea7433955fd54f8b70ce5153a18c1815855897f3d3c6a3556dd3c6e3f0b24b66083307d04979ca3c0edce94740951a17b87990fc24b666606b86a1245", 0x5f}], 0x1}, 0x4000) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)) socketpair(0x5, 0x2, 0x8001, &(0x7f00000027c0)) sendmsg$kcm(r6, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r7, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0), 0x0, 0x4004090}, 0x810) 2018/03/31 09:45:54 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af9") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r2 = gettid() r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c00)={&(0x7f0000000600)='./file0\x00'}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r3, 0x50, &(0x7f0000000c40)}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r4, 0x28, &(0x7f0000000540)}, 0x10) perf_event_open(&(0x7f0000000b80)={0x3, 0x70, 0x40000, 0x7f, 0x2, 0x0, 0x0, 0x1, 0x4014, 0x4, 0x9, 0x2, 0xe8e, 0x7, 0x5, 0x3, 0x40, 0x9, 0x8, 0x1000, 0x400, 0x4, 0x8001, 0x8, 0x69, 0xfe0, 0x7fffffff, 0x1000, 0x9, 0xff, 0x3, 0x3ff, 0x3, 0x80000000, 0x4, 0xffffffffffffffff, 0x0, 0x200000000007a5, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000005c0), 0x7}, 0x2000, 0x9, 0x10000, 0x0, 0x4, 0x9, 0x258}, r2, 0xd, r0, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r5}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000a80)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) recvmsg(0xffffffffffffff9c, &(0x7f00000092c0)={&(0x7f0000007f80)=@can={0x0, 0x0}, 0x80, &(0x7f0000008280)=[{&(0x7f0000008000)=""/33, 0x21}, {&(0x7f0000008040)=""/2, 0x2}, {&(0x7f0000008080)=""/199, 0xc7}, {&(0x7f0000008180)=""/233, 0xe9}], 0x4, &(0x7f00000082c0)=""/4096, 0x1000, 0xb41}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000009300)={0xb, 0x8, &(0x7f0000000640)=@raw=[@generic={0x7fffffff, 0x400, 0xa}, @initr0={0x18, 0x0, 0x0, 0x0, 0x458}, @alu={0x7, 0x7, 0x4, 0xa, 0x4, 0xfffffffc, 0xc}, @generic={0x80000001, 0x2, 0xe6d4, 0x100}], &(0x7f0000000a40)='syzkaller\x00', 0x6, 0x3a, &(0x7f0000000a80)=""/58, 0x0, 0x1, [], r3}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:54 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:55 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xf, 0x0, 0xffffffff, 0x6, 0xd, r0, 0x9}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xe, 0x1000, 0x8000, 0xfffffffffffffffc, 0x1, r0, 0x7464}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xcd}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x299, &(0x7f00001a7f05)=""/251}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f00000000c0)="b82283392dc50ff1fb635a5849d2f5916ae2fdc24e95e12aa8daccf7393e72be9cc66f"}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000003340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) [ 295.940663] FAULT_INJECTION: forcing a failure. [ 295.940663] name failslab, interval 1, probability 0, space 0, times 0 [ 295.951956] CPU: 0 PID: 22323 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 295.959216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.968545] Call Trace: [ 295.971114] dump_stack+0x194/0x24d [ 295.974722] ? arch_local_irq_restore+0x53/0x53 [ 295.979368] ? __save_stack_trace+0x7e/0xd0 [ 295.983667] should_fail+0x8c0/0xa40 [ 295.987357] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 295.992435] ? kasan_kmalloc+0xad/0xe0 [ 295.996302] ? kmem_cache_alloc_trace+0x136/0x740 [ 296.001119] ? __memcg_init_list_lru_node+0x169/0x270 [ 296.006284] ? __list_lru_init+0x544/0x750 [ 296.010494] ? sget_userns+0x6b1/0xe40 [ 296.014357] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 296.019089] ? do_mount+0xea4/0x2bb0 [ 296.022779] ? SyS_mount+0xab/0x120 [ 296.026380] ? do_syscall_64+0x281/0x940 [ 296.030417] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 296.035758] ? find_held_lock+0x35/0x1d0 [ 296.039799] ? __lock_is_held+0xb6/0x140 [ 296.043841] ? check_same_owner+0x320/0x320 [ 296.048142] ? rcu_note_context_switch+0x710/0x710 [ 296.053050] should_failslab+0xec/0x120 [ 296.057000] kmem_cache_alloc_trace+0x4b/0x740 [ 296.061562] ? __kmalloc_node+0x33/0x70 [ 296.065511] ? __kmalloc_node+0x33/0x70 [ 296.069461] ? rcu_read_lock_sched_held+0x108/0x120 [ 296.074458] __memcg_init_list_lru_node+0x169/0x270 [ 296.079452] ? list_lru_add+0x7c0/0x7c0 [ 296.083401] ? __kmalloc_node+0x47/0x70 [ 296.087353] __list_lru_init+0x544/0x750 [ 296.091393] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 296.097252] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 296.102247] ? lockdep_init_map+0x9/0x10 [ 296.106284] sget_userns+0x6b1/0xe40 [ 296.109971] ? set_anon_super+0x20/0x20 [ 296.113920] ? put_filp+0x90/0x90 [ 296.117348] ? destroy_unused_super.part.6+0xd0/0xd0 [ 296.122426] ? alloc_vfsmnt+0x762/0x9c0 [ 296.126375] ? path_lookupat+0x238/0xba0 [ 296.130409] ? mnt_free_id.isra.21+0x50/0x50 [ 296.134799] ? trace_hardirqs_off+0x10/0x10 [ 296.139097] ? putname+0xee/0x130 [ 296.142525] ? cap_capable+0x1b5/0x230 [ 296.146390] ? security_capable+0x8e/0xc0 [ 296.150514] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 296.155680] ? ns_capable_common+0xcf/0x160 [ 296.159978] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 296.165142] mount_ns+0x6d/0x190 [ 296.168484] rpc_mount+0x9e/0xd0 [ 296.171831] mount_fs+0x66/0x2d0 [ 296.175173] vfs_kern_mount.part.26+0xc6/0x4a0 [ 296.179733] ? may_umount+0xa0/0xa0 [ 296.183337] ? _raw_read_unlock+0x22/0x30 [ 296.187461] ? __get_fs_type+0x8a/0xc0 [ 296.191327] do_mount+0xea4/0x2bb0 [ 296.194842] ? __might_fault+0x110/0x1d0 [ 296.198880] ? copy_mount_string+0x40/0x40 [ 296.203088] ? check_same_owner+0x320/0x320 [ 296.207383] ? __check_object_size+0x8b/0x530 [ 296.211858] ? __might_sleep+0x95/0x190 [ 296.215811] ? kasan_check_write+0x14/0x20 [ 296.220026] ? _copy_from_user+0x99/0x110 [ 296.224150] ? memdup_user+0x5e/0x90 [ 296.227840] ? copy_mount_options+0x1f7/0x2e0 [ 296.232310] SyS_mount+0xab/0x120 [ 296.235737] ? copy_mnt_ns+0xb30/0xb30 [ 296.239602] do_syscall_64+0x281/0x940 [ 296.243463] ? vmalloc_sync_all+0x30/0x30 [ 296.247584] ? _raw_spin_unlock_irq+0x27/0x70 [ 296.252056] ? finish_task_switch+0x1c1/0x7e0 [ 296.256528] ? syscall_return_slowpath+0x550/0x550 [ 296.261433] ? syscall_return_slowpath+0x2ac/0x550 [ 296.266336] ? prepare_exit_to_usermode+0x350/0x350 [ 296.271327] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 296.276668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.281487] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 296.286650] RIP: 0033:0x454e79 2018/03/31 09:45:55 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)={0xb, 0x381, 0x101, 0x9, 0x1, 0x1, 0x3f}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001000)={r1, 0xfffffffffffffd6d, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r2, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000fc0)={&(0x7f0000000a80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x4, 0x1, 0x4, 0x3, {0xa, 0x4e23, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x100}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000001600)="e96deb27322ba4578697a0f496ef9c65e5b2defbd53fe99d5f41cc3d571f89288572fdcbb4cd3ccb3c7cb476363c770eec3ce24b578def352161edab68ace0951721179711ea11163d738d3a787081afbd11f1302b56ca48b2b90aedc15e50d0e25724dfb218365d5e35a4e0fb577f713c71cb817c50f8332c92206d4d867f4462b4e1bfd04200f5835aab95f3fc6b782932608967fb2e5c9b88c972a6fbccbd2d5455d65d54ee41bb0973fc93e9ac00cfd21f9b239d7ffccd9ce8e851860137d587fa84057eda8caeabf26f193c8a8e2d17012ed74629e6f99f9b2dbc9455cc752882986ce7254d8194fe8a9c0d6f21b40349b040889ae7753280c774691492f9799ef633a5ee5f236cdc3ef6411bfc03f347b73b642afbb7234ac1d8bb9eb46484252d89a47a01740da8303fcfb4a7e13581272252425392f444972aefeeb576f228a6f76be8a13aca2fbe3d7d2bae8ad422a2892f2e43f1e636bae817aab6bf893cfde32cb2775b9b24c5f9d10da85d23fb4436a830bd41cc45e5a2dbb5a94219b7f6a2a66298425f7062fd38c8b8316cdce7b7961168a1d6181c58198f3cc6b71a31efd11684dbc2036630d14d1522b83f2ced786a90e8a743c3529e46597c9cfe4807ef06f2b3ebb2b329e6f7c7dc1a3c0cbe3d8b61ccb8e8848f0f36c4db7ff41041dabff5d840e9b23793b0038fb9b577368a34d4e9fac1f869d75e96d173c553c476b34f259690d4dedc4f68152ab10f6d4afe2d3d6d2864be131eb09014d149bff4506966d66c7a3ae408b6587bd93c3a29389809b3262fb67e31e958e5dca496f77403b50d99b68df8a1c23826ed279860b05154e22ac359b5cd151c75fc54cd2d86b5da91dacda9847c90699e84123cccc911b927d87ce582f9931b5befaf1173746c39f5427c2219eaa1e524640e8392dc83fa300bd90edecddfda4904eed1c8ac4fdc2e10908dd9c94c4eb7e84588b919c83ee5b0c5c480a22f6c4698f14423d6c9c68d873f1ad10f82cb471e7b98ff223384d359ff39a92b597cbdda0d4fbf330ebc784ddc81fa8760f73c085b0c6f375a7ea1b38fae0451dd57e59013cc25ccefde5df655e216d82d68f10fe9f1437381eb0e7ee15bdf1424f00fafb78d48d7add92fdc41a049a14bc89242a990e8db49090103280e90b17edfdb1445246077b92c083dc33c25a0e6eca2961c2d31dfe93536d40e1fa28a9b3bd61c20cc87c0d3bd3120210475b2d108632d37b8f8293dd82553b2884738e0148fcb0eb7b7ce3d1e6158174b9a2adbc89d82110154c607607e8d6c6b10ce60930ecb5c796c33164e29ef48573a8c57b4fceb8d1dff0b9d3512e8f9a7389088d68bb5cc723b31756362aba996d1290053688bce9a75e118960c732a1ad07a519b823dc122fa986592f536563801625cc659a591a36128d4e5d495a6f510374d18116ef82d22f4121d8208e361fc19739696127d8c37b5b497212049f4286f54ca673916d8f736276c9ec2a8c852a7f13e2c1c6ef519aaa365c1b46b50d60e7dcbbca283834fdeb48af2b43bbbbe93403795534bd0593461b4ee00a79a9bbb715ab2f55a93e1800480c60bb3eb6f0aa0c5ede58a6bcbb5fd40e696df34222642e5daadec2c09628f13449f8e9690fe915ceecc0537ef4fd8f145910e967d8382c1a541190976577c14fa341b650dd30786803564bc29bd88f879ed48fd244fa9cdb051b9bba4b4e62f0fe0917d23c8f9265b9df2993b4ceb9d3cde902c9065445b42179d410fe11a0ed8889543057160760091c153fe7e92969dce443405e03da5ca48765950b00403f664227fbf5c85050057f7b246eb32f8cd47cc63042b86ba2e8856a062007b421f603b1a03aa3b9be8e2d116fb2abafbc69efb52f3ab24ae18396c2d2828661cb39d3566d83705b9d418aff3bbaa5d563d81633f0c9cea26c7a81f709c4813beab44e2bd72c92462699be79e06626c13ffa86693ff94fbb075a473d243788e2d1c273628d66eeed427833dd507536b91176cae1e480fdd6d7134f065afa97ce02f08ce343664702457c16e4ae8608db2e90954bdf0a80edea3a102eb7dfd7bba199af1beaff5580dfae70ab2e4e18d0b83c268d9b604dd89f16954a967796b4df5532a2a566b2ee1de5319f2081642999b45f4a61265056e415d0a2e8714cdbc85e6257fc15d95399157667665ede517ebef0c5a10473310bacdc932e4bc4f95a376de9e8d047eee45fc22cb827a9687b5497b0b955546bdd9aa04ccae61bdaf311dd7fdb44f727d53aaddcd55fd0d3ab15a93459e254f1628cc45d1e7cec7df5e20e35f59803281384435562551e034dff4380a2dc6948b9c8073ded42ecf0bd6a770b93bf0d228cde3998c7ce6de4fe188780d36543aab77aa078db4bbdd5d4652286db2884672c0bc05499a105d6ae0d6a369f0a8be221ab15550cbede153bd9cf4c3c8906efcc42d0dcda07a3d6250f8cf14e5f2da33bae714141474f5d2ab1159f9d74861cc55f6a044f9406ab1de04eaa8add82dd323f75c9049842a3ccdb6ab017919ec85a4a51934eb0f0d46a9cee349cf6b2b458b4b130a2b4c1df5f77d6d30230a6e8eaeac66047fcf598b7333a36f04d160c006e33e31ad9d886f104b8c817df6cb474f9bfd024b41f75b7e7652dcdef1f53cc5ca032d7d5a00049ed3d952a2232b506e1f7f8cbd19c695272b84e78bdf3a61098fe59757a194ff951a0f3cb568627c6d6e976f098e2996aad1fa63655f9feb623910c2b5e20392ed16ef50453c0e0ec4269dc33811111bdfaa9235099daf0d1be02da292adcf09aec3931533140b28bd014f5cb23800e0fb242ff457c341e3a037ff50462ea75a8a8721a683d4c701b7f8bc1b6780060d3f5a2fa108b5b6d200465c50ed752099baad38200d1dfc8495924245f0d737134621749baa88f88f27a691963267c926e19b8c933f2778262d95fdf7ecb957a0b75f56233501935ff70256ce7eeb1c4fdf9e5ef9db32b33f141fd54648ef3624b504f29fe782650da45ac9841718fe7c41a3f5143a732b86942b41691b6371ecf3ab2eea9ad534e51d375163490cae690c06c911eb09ce805e2c5b6712ee2949481126a491fc263c27723a46d0c63e5ab381ceaeb3d7dcf3953f0666bfc21cb4ec815c8d76945336db0af88591fff06f3bc30aebb53c1ee852503752f372e2aefde6cdc0dcc79fa7a931e0238a8143d6886cdd6ae52aec0ec73ac47b37247e89e3029557fabd7f3eacbe8670d645de4c6067c7e12a4f27768f058ff7614be0016f5d1628c8cb3f1736eae20e32d22af5b03ae53c2c1984bcbd347332116fca191fb1b07285195a330d41a9126ce18b03b110592e6c96cde8569846500ee89cfb53ca470bd10806d63771af1fcb722c04db60066cb9d30809b2be8fb594255ea74a25edc47f65b8b6d1a7356cb53958686960db52f40864e292833cd132a298229daf75cde34ccad5639c5e09049b5d3a95d593a39a5d4375d824748587c822bcd1065dada0a813a2be996d84c1bfc6bb88c6d3ffb1a1e4c1555a97b59e5795189ac0aa95cbf09e277837e88ff4877178c90c2283283e440d1540a0e9b2b317eda882cf43c985164e47d7fc795e3ab76ca0d253da9408cb44654a81be82e860bdf7f29dd17fd95c4257bca822a431548ec40372493dd4f4fd188546944632b2261ae02f3d006dfd25f4bc85ba60b9ca54a1405733464c1b122cca5c119272efca5de1b162e32269cd2eb3e834c62e8256a88cea5429ce8c9b6879b6a0f6028672264ffcb1f4b16330af4355c11d5d4c4043d7b92decf88be64ccf9f22260dd910c8c084105387685be5e952babc4ff178c1fba85000968bdef438e3a6f83abf123e87747a26006ae7cfa2a98c9d85446460c61a9720cb2fa8cdff0288e832abba66b7b06ed5e68702f8a7bde0c24cc1a11e64d2969f9970fc54d39efb7d1ed1ba8aefb1b47f4f7b6b7f508671b0f00ecb6e7731831aa679ac8d4e3ebb3c7aefa3edfc60c96ee73ea64e5dcf13be73579c8101dd530d9dc2af938e0f9c9487df517592c44e11dd7b9d2ef9a9d01689093a92f74a1568ec7cc45fb938bddedf42ad56369851f0c68bc7d1b33b335670be4f3225c3dbb10b99f9d3beaa4a7fa630f2b3bfb4b32069e6c3864a87e87321f837ad0b8c28ca796d206523756631e7776bf1f3493f46472c9927f6e10b04b1108b2122eef0a72170bef32c3960a3594b454208077a58066dc250a457ae19243e9a7344f32e4d2f091da65f583db1fc2d8f894d8b9afdd882014f036cb8c1409a151a4209a47639c81a853578ef825a6f5e519332b5e2696ed498b2dca396db5866901d934c12c2c55390f4d60e39d3addfd1cc24d12b2e483745fad2ff7b03367769c1fc126b53a89401e5136d6a538bf25d2b96a843acc53ae67c1d042406ffa95e9816ed8d55ea91decfe25c842e77b2bd623a149a7e3bc39c5c3397f7954be280aa102c59bc0af0115271bd1bb72eb542cff642b50e4df0b57be04e7bd434f5f52609f2871566fe48cddfcd1b25471217dc498d96c79e62ddeaddd61ffb3b18ac48268f8c615959638407737df37c6e6cd284d21211ef9f71dc60ff8f25aff4d12c5d3049e5a2d53c06454eb0a09764ea6ff5e8dfb15fb961fb20759bfd3c7066437a789388beced0ef2592c59b5163d59f535d2cdf94ae04d7ef353f74d3305afae4324c6e48630c7b59d5dd56ee96ee0597b94c7caa94f5398074947e370da6ec64449c5bd616374883ba3127bd9d2f1a2fd1f8f355a13bbec5d5ba2bf5a9572fc23542b4a8190e85779b22f5c18a980f4c953c08c06ae16540934d93f9e629eee655bb132ac812da176f12e73938dfe0747f139863584ee1662f307353afb71f2204df77bde17fc51875d65b26aa88ba751acf03b294f8f29ef5572560da0a62f2b17a128cfe1b16a7bcb662a8924f449a165517292a0c9eb85ee43c43af932fae35ddac0ac35d1b26e0a6bf1863b385e07e992fa8281fc3eeb86fa9d744707698c0614dd1c5ddd761515d13692e64b082c1c0bf21e6c4b1fa2944d6277285c390fa7e9d9d88db3e38928e8ab9153961743c39b9319808642a72fa1cf061dbe233e5e9569a50f34d773170c10dc15b3286621d1f5c251aa30145fbcc3cd8e038bfa60ac10edbd6b4ae4830298a463d89e5a59fb18841ccea280d767a5c51a72b5b5e58015c505eb7747a66fa72cbb34ebf1283044b70c3e4da9372485ea3f9dbf3dfd2bc2c643d614ed083bc65b0db4dc866b0a5b1a45d9dc93c7cd60484429ea70270b9949163da4f2223ced71d3d45778d2fb5d6285a4ead9f520145283c5f71f3d360083b7d7d5bd31512f2857e897264442b9cbf3e3e6aa1b4dab50e89bd786893ff2ef1f5ff910adeb7bbef21b9032f8800afafafbbae814d992c15768a400e231918856acc25781dc14493450996a20c6d3c0f643c3dc7b83e7f8a429791bd22db8f6d9e4db2db139181dbd1d1ca1296490ffb4c14c3122fad327304d6aa1aeadcee2c144036c6e14d3011773396eb859f7012b3c5e9edbd035ae54021bc3213e71495bd25c0066365114a573fe5a8db0396518adf2b08f89e0819b717935c6d591b82b9479f0cba30e68dbd28adebd3285d6722033609fc7965bce09d830a1b58bec029d438eb313e609c948f33e30b302476f7a46e9cb51db5010b239a32a15a7ee80372bec0868b3a2409b1df848c36b8561ce3ad8c4669c2a9a5a18d51db010c1c8457b441fcda843dc8fed8476b4694", 0x1000}, {&(0x7f0000000b00)="93f4e82f3e92c551146a7d4214fecbc5577764e4f52c7b5910a196264c442523232a0ab46070d8c3f33f734f16309a2b8b1ce387d0a1331022152bedcb04af318d062184ead6f15169922c60680eedd2ae66202698db962486986bd90cc3b3de0f6a7b9d08bfb5d5072e158823274b50eb58787876189346b55ef5eb457f1cfae797ba2254c6ed2d8a24cffe75548a9f01119cca055f634b3e79b17bc97e3526ba8d9bd9f608c6c67ccfb7ade103331bd04c663287c0a246c54222bba3998aab52e2af668e9008c8efee8ce56781832d6b1fd59728e86850cb361d37eccb41cddd053108", 0xe4}, {&(0x7f0000000c00)="3300fc90b140b89af6b76bb43148ac1a9df76d083ef78da569b94e933117005fc7db6f01480100d7f80133b618b7", 0x2e}, {&(0x7f0000000c40)="cf0ac8a19a32183d581a73f7ca66291e68daca0474f62e88c1a27ff6401ca7e5ef623557839eebd66fd9962cd1be3cde2bf0888ba82b1bbcf9aec297e4d83fdaf8ab55981a2c1017bea8802fb3ba52ad52216495bb84f2922e7f04", 0x5b}, {&(0x7f0000002600)="3ce29b04bf6baa3a83c5328c878eb311b6f7015a2ad87381d17bb21e6aacc2aa4ca42f97bff79dbb180d71a09e6214404afd79633af658648e6af693765d816ee9090880f95d6854571df3b7f905be096a8d6c01c402f7560ad03957b06b59451478d9e747ae97c98f7bb90b62597418739f41a080e328a377526f85896deabf61ef73ec5cade864da9e20bdfaee74b0aaae69fa3a7a782396b54dcf3ef239c46f789df3560f530d792576cf9c6fcf6c356d0867f3a5fb42f4b00040cad8337e56a04d281aba4f91abae85a4a5500c3daade508a90f0873385ab085bc68dd729ac437aa62ac9d0f6eebf41a18da2abc7236b052b0c15d3da2f2bdbdd1620e514a9e6cd0763c3fabb08c917b551aa0e3ce8acba5ff8ffdff951b45f5d17a4723ae1572a127d4004604cd52ae3ab71ce4695239581015224fd2426fa444e04833ad825949dead2613271511dd5a2e0d81e76a8bfdd882872f0777f6844a2517d367f8221b2b722f8e39b89ed333e48267c9adb6506716c7d963fe306580d73f53f1ed3038ddffa94a46df58895401609c3b66ab53a682c659545ded13c8d4655a7376b51afc07d9d34c73040f82220a29f53ff8066e3449b3975faa8a43bbc4566941ed5583329c2332ec0f2ce1ecf093c6385d44e25aa6b904a45a53d10598154eac57b47f8982e7ec12b15c1a95abfef2a0b0b55162b11d1f7c6b743d443bb63ce7e3a10f4adb006f36d83f6510dea4b3dc84fa8d26837f0e9908bba3547eb2be3ce9b1c9550837ee5272438f444763177c0821b9a09e82f7c09ced8a64356a7866f1b40d79a6c500e3ce5a3c57eb83e8d8578b6027f8de625037f9cd92a68140112ad7e493362f5b6aa0bf0d25663332e81dd4b8b2aa3c95f4da758e000f37220ca7225fd0f2896a3b184a5bb21b33f3d97363d84385e230e6389fef2c184f2cdbeebaf97d080bcb23995ca424c4fbf34a46c15b2b8d3a7040087f1647b66b7172ce6c8147b0e2ab42e050bfdb0d4b905d6bf553c5bcd39859d457c3b088f6b2bd77131fb0d0f462e6a029f2b840a2c0353bfb6c270bcc4340ffb53b4e21f2f67c8fe616469398af66d9654b2a3b0f0d0d7e62eb5f0efa5b6f4ad4ece858b40eb8bf0696221fae29f6f35300b4185950934592c0c1d830829ed82eac6cb6e2274f167ade46a00d7eebeaa5c7b520a79128b9b2756aa759c7ce919fbc3aa9261245a8cdc79fc3a96af3db9d147e86750c1bb71a57e282db4a9150723954591458b58935b8c8f8bf09e893153caae478895b54c7477220c4cbd9ef5d3aa3f5c8c65d135210fe66bd0742b392cdfcae0fb9a8c9b73d709c1f83b1b7e381cbf82cf4155562338aa9c6e31f234c6398af700927d32583592114e0ebb87127ff3eff28c08649e4fd1ff3a2f0d33859244cc46d5e111d95d60a35524ffa790e5802c4298540380335fa483f575071d735782722ee82ee2a6ffa2ae849f11d110f80a450ea630195878231d65a9c2cc1ed8c2efc5c0d91514ceb2442844ac458a8c966f5a857c51c53b9b45343eaf2c4586ba982e80477ed8f53bf79ea5017ea036b5d9f84d9c90d407b06809ffe06b08adf6d02973025e45b1ed24273af8ee1932134a1e5dd807f501a613dbcd4efb670b7608050e742e6474be07f96c62d8962055cdf8b1f6230ee4721a88a241ba51627de911de8737a09dcd91d4f4c7135747dfe10d480be5a73afe77a2470c518e7ff3b1501fa1e24edb73fbbcd94a14c72cfd17cb05a230675e29b5ff9360433432332c8ac346e9d7aef40d9eb90c254717379904c091a8aadd1c568fb9cae9dc354060e60469b5380707a9837d666c98da0e9a9e15b1435db42a57dc8aaa0f81e4b1101ccefb6c7425b2a9bbaa25fed5ae43edc637f1d5232314e0af2be4d8ca95b999c31a3c3ec281ffd0542f91640e64b522602ce1abe81280326434f9b422502786b0df7b5180c4ac675cb74eaff194eee15c1add65803f938d935c6b03309ec81d7f7889e524790acf015eb815c7d52debfa6dbb5899644cacc5a3c8de2aa19a675994d84dcd8380ee04a29d0465e4c3a1439ebb0034db347ccf8dc50ffbbe98a19d7fed890dd5eea88daa6ba1961fc47f0ae47a2e71d9cb1184ee2c15c20eb593cd17791a5274aae654f4660b8291bf99fec0e456cf427f6838d7e6ebf02712d125a03468b16bd558710df1e7a95f0481b63d28a15fd575389bb7439ff68fdaa118d16ee6d66e033913649d290371d73d19806c4b3d7460e2b6ee30b843a1f418cfd7114e35c67838e056bbc958f6d751eec69b709e6604f5455c4c05bb91d6e30a8f0e88ab8ac005d276060aac2d95362ce0f8d3caa4e211111f836c87b383b3a13630f1333283bcd140a2f590c60e23a3fbc94e20c0be3e0eb08afd9b826e5b6b41eb944ed55bea52c7226915e07a92b4f524ad547deb8aeee50ea5b25bb5ed1546fd00b121005bb7c77bde410f09b7fe7586e38bb3e8ca75dba5d3ac0c28ca8d7e12dea32fe1c57ee7c7c23518dcae44c43a88fec58f338895afb86d007ad07886f785f39cd4535c00ea3d32d0091f193185dba3b0e378a07e5e80669c1055a1581f777dd2d03211e6cc0accf3a7a6a7bb02d545ff2302cd74a7d15c369e61015f6944fa3181fe9bc31477cf7a3bf9d9607fbb2c521c07f2aa4098fe9857bd56587bd477a5108872acc8e5dfca2c75f9bbd26c3dd6e29d8f7d8588ef5e3db204284c6df97c4d9dbc371e591acba149eb930b5314471333e8b6186c8a4a60d13edf398bcf1f90136da015996150a4cf884decd3a6ce07c01f4c7b45b93c672b723047a57101e548423c94ff3aa03d1107f2ab7d4045ae94b822cbac7c0a2c882f875aab5d9583e9292ef06da9daf7223749d6ab43efdca76946c5f264cf8036421c12070b7fb494d6259a149c31a2be6f33872c602819a3e0220fe6fbcb71a79f07ba93b0925870220b1ff4a02b1b1a391b86915049e355213efb8e19818674bd21d5544aefe577f6337f2a621cd09d21e5b539877a9abad682ae049fe24c619a0dc9312702aa8e14e492e9f7031a0dfb7ff9dba9eddeac3fb54cbe74ba6b444667a2a8da4010f6022ca788fac69c563271748ae2595f048cecef61fb0ee47020fce1401a8d80f389a37f7163629b4e97d94fd7f2d415d66fbaa5d12b3734ae5e97d5985e67d4d936255727724f72940b6b0411495313f668c6a91cb2bd54de4737e4dfb0c30280d45b185b728a2dcf83f8d67a6b1cd4929ab32b8cef1736626322dd25809eda2f6e8bafdad2de62352c67ca6785f70aa379e4cb4d6f511eb7056d34394d6083d06b5c0051f505826f1c26eb4547995dce4cc8decc00c8f6a9984bfa29c1320e613ce80131a6f52fcb39f8a9d41ad9236d0da5ebec2added4823196ba9d65bcdf7bac1bfe1d4a901669220e96de10a7a4b0c7364f8860758bb661af677ae791fef920cbf18b21c6013ff493de7a8fd42dd6aa9fe04bf98289db69cb56fbb6358fbc7a063bfdb3608bdd0a0b70d923795729ec93c7e0aba20f2a613aec67d025c8783379f859b57ad2d6a3103126f41046357bcad4686b00177bd58d8fe8e97f1cf2d861fc3e753073f71528bf926c3f6ea36edc8a3a6d35c6cafbd84a69afc2f4132b04d8cdc93e6bfaf50f584f4885ef97ce9d069173a09d465730c3b686a404ce00de305eeac6225aab1eb747ffcf53cf336087d5b218db1f777d148dbcb8386fc3d3588a7f8eb2df26ff73d199dd977a801da6501272c72e84b00b553cf6df993a8ba881ecc9b5c7baa45cbd1effeae19caa7bbac4550a16d4cb399ff3a7b9c572c670524a12291d7edab47c192ce412e8e9ad89a39911e34d49e87d78d753911e9d360208f354a836bd63ce9561d2f7d76a503a12798a2cb9ad1de0f3dc6aa5730b3338125c81b72a0ef57b35bae9c3ccff51440079bf4950cdade527f370690fe45a70c220734e832e2bb57ed9c7ebc1ce71ad2ccc4273b5392a586a7b7808eb65e2b064122f445fe94767aafd39efcd88178c41042455785e954ebc862951fd31143b88ace153f6a85568f7b60a812892a96c3428baa5d8e909b38817dc9970c927b0889f111aacef13c65af5d1e3a27c9249fdd5b4f50cf9477dcf3cd470358dcad43635c58d9b2b385ac5e72e7dd5ff529d93c84a1c9b0e3932c54c06a0a1a1b9cc02fb56cc75992fa335d08c76436f868cd1a4bbbddd2166c79d0f40b2a2fbf41cec904ca16dea9b861fafb82dffcd6fe3d0dd85963ee15ac97b74dd8f03c577aaca38d2ac2b407b3e98988d31dbc29393bdae12e3668189dd1d34b41a8fce7a830a11a9b3dd3f482dc955da2b08e02044035bfbdd19ea19e1eb0e8631f1fdcc351da8a94c8f36025dd1b1a554aca3568e52634c907f4c51178d73756d69b5e1cd0713ead765a975895f02cb951cd1997f3ba018b6d186813ee814b8e2e314c11e9ca82fdfce887b75f2f6cb3b65fb0384e64f5a0ce2e748c3994f18fce88b4a5b8869d0ba0465489ff3bec4a30d4c2f3e84d38c1cce6ee1bf0ecaa52f4c165e3d53c622e52b424638f2191b3a0139777be4de0ace398a16dc5b6e3050599be9f61b8483d2ad40f300a52479d0d0594c168fa3cec161693fc87cff38f2b9984f4cad9695403a9b9e69b966566a297f704c0fc44fb77754e07ed6526dfff85c14ddb5d6cb81ce2b0d92fa01579cf42d581e1c2bf4f70db5acb1051cf6e8b84ef2294767f4229a7da8bf43cdf65dac4237debe97d552f99d27062a3c57186fdfeb78eae42a66af74b796c27737325ccb09e246c65d4b95039ead8ccf7bcb7977426b9faeeeabd50d3c0018aff07aa164c1fdeadf2be508f8e0e5e16affa6a158ab67a71593b9f62a5ef3b0c33ed684f0079b6fbcbf490899a3f5161d00c1d41177b7db662782b513c7d975194bcdb1f57282661e7bfbde2505ce40ceb28bf338fa001af5e8b7ad5d5071c23d51e2ccebe5d7dbc07980dbf4cec23d89a4bf6e9b2d825c453169fc99c3f5afab6d1ee20c25e314f7a3304e73ce63b5c007080bd34b83375690b5409708164f62d8a15f8ee8e6826194a8b324f2aa923ab3fa88f84a44be68cd62d1994bcc60bd4ae6a62822d2f6ccfe3303e5372434115d0a2313fcf2078133f09364cbcfaeb76e32daf3639916fdd780f82941d4db7681b700d74e13f3e07a3a7aed31580356ea74bb99bb55b79b7bf885feef270e9ee1e2786d99dfa6842bab1b1b56b29786cf9c59f7e70dcae3a603064741ec672620a89c66cd1ebf4a8424f28e22f2f7e1a22d937d90b357f42d09194652afee2dfc3ee283041f2a85ee4a84599af8b51c0a187706bde05f64f2dbaef610f9c0db3a3a6e17477e41bc8a8de61484c271022ca1fb8dd9a255d861ffc8de58c2c054cab925304989b947ecce8284bcc08cc0fa1841835f20614224ca4f677363848fb3224d3984f47b064431e9a63597df1c0b9443c50ed9e88d3a3edc0161b8bb99bff48ef574d0699c0d38cea25ef08a9a8b7689a35ffcb64748bb5573e392120cb7568eefd1197fd28f95abf5bc4be6231385e458e56a3ff8e777e027ae3664fa3fa2c3adb302bdbbbe16662ebe22f504fc8e24a04c48777bd72538322180eefeaf2f7c3560c1f1e55a4587bdee1453ae688d63965903d50c862938813bafc273ad2b94e5e920523690020655466b5fee989d93b470fefe566af733653f7c63b4c2bb61226e54f5e32ef8f5fdf9d1bcffb1bf3a75a2a72af0f583179a19aadf81c400c37335a5188d6b2", 0x1000}], 0x5, &(0x7f0000000d40)=[{0x68, 0x117, 0x200, "3baf388430d9f3f5cfd413b836a1659f9d2279fd94590d672700e331160c4f4971036b878632173db6a2f71575b2f19e726c89007115428b89200b4e889d81cdc4bac9d1614b091a29759c5269753470c89525d8"}, {0xc8, 0x100, 0x3fe0000, "2ca9e905e769a2d9c7e3e9da3c30d6bb9112be40ef3bfe0e5caf670b9dfabeec20bad52e244420f1fa2219243d9ab6c6a8a0401c0384d217a12dfde87bfc976426ec992b99ae5657954a1aa4cf44f46f10669d93ef6ace868b5503ba0bbde3f2600e57c450a31c1010b3d84277329f186029a17d70323511cb3583039489bf6253047ea6107ed984e25f78461f1bf25e8114a8d118c81bf578e54269da94586746d663095ebd84b150fb2b6fd35866fc8148e8"}, {0xd0, 0x88, 0x1, "2df192598d848999a20cb10d09755a1531d4f728d34cb7af9754e25c6f7f923ad339119aff52162c7662ed1ddd25a3e91c1b4eb5ed0696d92d5baa9e41aa8e587d988114bf0c5b11eb2b80cfb406a6c4169cf4674e8f0367f6a822e71618d0886210d3c37ba72e4afa8a3a47fdb4fc6ea45ece4bd745aaded7ccfc888b3021e589b1266b1ee6da613ccefa3b069e3f94e6a3f5f22482b0578ecae6b49d24a1bda45dbc72718b4a04e39365fac066862f95c79e4a554bf187159f6bff5a"}, {0x38, 0x13d, 0x5d, "41a222ea2e17de32e5c4e0f706b0be47f0b597e87d85e794cea4f8539ad543d678"}, {0x28, 0x0, 0x3, "0748465eec980a1a543a07da32d540ae4ccdc64c8f662540"}], 0x260, 0x884}, 0x8800) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:55 executing program 0 (fault-call:18 fault-nth:52): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) [ 296.289813] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.297497] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 296.304742] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 296.311989] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 296.319235] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 296.326481] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000033 2018/03/31 09:45:55 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af9") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 296.407797] cgroup: cgroup2: unknown option "./file0/" 2018/03/31 09:45:55 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f0000000b00)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a40)='./file1\x00', &(0x7f0000000a80)='ufs\x00', 0x8, &(0x7f0000000ac0)="533904805f1eaa75830e858412ebb38f32") bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:55 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='pipefs\x00', 0x2010000, &(0x7f0000000bc0)="a23922d195d21f5f1bb54191a57e9153cac47470abc235a7ffb3c578644ff98c4a584db43622c7324ec4dda0a51039cc6bdb34adbc2aee02848cb5c3e8f82e0b48aa3759a1a13460abe42e1edc0c4d240c3e2a79f8b778607b00cccb36a667d3fd7566ef84cc3ac1aa71f7e633da1f6904502caf922015ed763346eb4bd6267b01b7734c1741314d47d7090305b9e2a4c09232077836b9dd0c5e23a833da9e9470f55ad6f10375ebdbc843601049ecb732d7a94ca9f02c87903accd36aa315ee3577b036ef49f375db6c34fa1a7f34f381984d8da5a75ef1ab") mount(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000a80)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r3}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 296.670549] FAULT_INJECTION: forcing a failure. [ 296.670549] name failslab, interval 1, probability 0, space 0, times 0 [ 296.681909] CPU: 1 PID: 22360 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 296.689181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.698530] Call Trace: [ 296.701105] dump_stack+0x194/0x24d [ 296.704717] ? arch_local_irq_restore+0x53/0x53 [ 296.709366] ? __save_stack_trace+0x7e/0xd0 [ 296.713679] should_fail+0x8c0/0xa40 [ 296.717376] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 296.722459] ? kasan_kmalloc+0xad/0xe0 [ 296.726327] ? kmem_cache_alloc_trace+0x136/0x740 [ 296.731150] ? __memcg_init_list_lru_node+0x169/0x270 [ 296.736320] ? __list_lru_init+0x544/0x750 [ 296.740533] ? sget_userns+0x6b1/0xe40 [ 296.744405] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 296.749137] ? do_mount+0xea4/0x2bb0 [ 296.752828] ? SyS_mount+0xab/0x120 [ 296.756434] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 296.761783] ? find_held_lock+0x35/0x1d0 [ 296.765828] ? __lock_is_held+0xb6/0x140 [ 296.769880] ? check_same_owner+0x320/0x320 [ 296.774183] ? rcu_note_context_switch+0x710/0x710 [ 296.779100] should_failslab+0xec/0x120 [ 296.783054] kmem_cache_alloc_trace+0x4b/0x740 [ 296.787619] ? __kmalloc_node+0x33/0x70 [ 296.791573] ? __kmalloc_node+0x33/0x70 [ 296.795528] ? rcu_read_lock_sched_held+0x108/0x120 [ 296.800529] __memcg_init_list_lru_node+0x169/0x270 [ 296.805528] ? list_lru_add+0x7c0/0x7c0 [ 296.809481] ? __kmalloc_node+0x47/0x70 [ 296.813440] __list_lru_init+0x544/0x750 [ 296.817486] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 296.823353] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 296.828359] ? lockdep_init_map+0x9/0x10 [ 296.832406] sget_userns+0x6b1/0xe40 [ 296.836099] ? set_anon_super+0x20/0x20 [ 296.840057] ? put_filp+0x90/0x90 [ 296.843494] ? destroy_unused_super.part.6+0xd0/0xd0 [ 296.848577] ? alloc_vfsmnt+0x762/0x9c0 [ 296.852533] ? path_lookupat+0x238/0xba0 [ 296.856574] ? mnt_free_id.isra.21+0x50/0x50 [ 296.860969] ? trace_hardirqs_off+0x10/0x10 [ 296.865274] ? putname+0xee/0x130 [ 296.868713] ? cap_capable+0x1b5/0x230 [ 296.872587] ? security_capable+0x8e/0xc0 [ 296.876719] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 296.881888] ? ns_capable_common+0xcf/0x160 [ 296.886194] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 296.891364] mount_ns+0x6d/0x190 [ 296.894712] rpc_mount+0x9e/0xd0 [ 296.898059] mount_fs+0x66/0x2d0 [ 296.901407] vfs_kern_mount.part.26+0xc6/0x4a0 [ 296.905973] ? may_umount+0xa0/0xa0 [ 296.909580] ? _raw_read_unlock+0x22/0x30 [ 296.913710] ? __get_fs_type+0x8a/0xc0 [ 296.917585] do_mount+0xea4/0x2bb0 [ 296.921106] ? __might_fault+0x110/0x1d0 [ 296.925154] ? copy_mount_string+0x40/0x40 [ 296.929368] ? __check_object_size+0x8b/0x530 [ 296.933848] ? __might_sleep+0x95/0x190 [ 296.937807] ? kasan_check_write+0x14/0x20 [ 296.942027] ? _copy_from_user+0x99/0x110 [ 296.946162] ? memdup_user+0x5e/0x90 [ 296.949854] ? copy_mount_options+0x1f7/0x2e0 [ 296.954333] SyS_mount+0xab/0x120 [ 296.957763] ? copy_mnt_ns+0xb30/0xb30 [ 296.961632] do_syscall_64+0x281/0x940 [ 296.965500] ? vmalloc_sync_all+0x30/0x30 [ 296.969630] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 296.975149] ? syscall_return_slowpath+0x550/0x550 [ 296.980058] ? syscall_return_slowpath+0x2ac/0x550 [ 296.984973] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 296.990322] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.995149] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 297.000318] RIP: 0033:0x454e79 [ 297.003485] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.011176] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 2018/03/31 09:45:56 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 297.018427] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 297.025677] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 297.032924] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 297.040174] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000034 2018/03/31 09:45:56 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg(0xffffffffffffff9c, &(0x7f0000007200)={&(0x7f0000006d00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000070c0)=[{&(0x7f0000006d80)=""/162, 0xa2}, {&(0x7f0000006e40)=""/105, 0x69}, {&(0x7f0000006ec0)=""/75, 0x4b}, {&(0x7f0000006f40)=""/182, 0xb6}, {&(0x7f0000007000)=""/79, 0x4f}, {&(0x7f0000007080)=""/48, 0x30}], 0x6, &(0x7f0000007140)=""/135, 0x87, 0x7fff}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000007240)={0x5, 0xc, &(0x7f0000000440)=@raw=[@call={0x85, 0x0, 0x0, 0x1}, @alu={0x0, 0x5f5baa66, 0x7, 0xf, 0x7, 0xfffffffc, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x0, 0x1, 0x3, 0x7, 0x4, 0xfffffffe}, @exit={0x95}, @exit={0x95}], &(0x7f00000004c0)='syzkaller\x00', 0xe0000000000000, 0x28, &(0x7f0000000500)=""/40, 0x40f00, 0x1, [], r1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000007a0affffff0c04c5275c84"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000300)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000028000006a0a00fffffff6006118"], &(0x7f0000000080)='syzkalleP\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) 2018/03/31 09:45:56 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x74, 0xad, &(0x7f0000000180)="b0bf5bfb231f35682328112d9efbcd387a6bcf4bb7e4f4b6209ba08ab8fc8d4aa2acae80fd83cd36272638d1c69e100a66dda3705f1f7ef51321d0d1704134cabbfe1877e525094d86bf8e9be017923f36041428907b1806b30b1b305b2818a82306cf63ed1ac3d5e660a9be092cbdc929e77a8f", &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:56 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r3 = gettid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x400000, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r5}, 0x8d) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c80)={r2, &(0x7f0000000600), &(0x7f0000000b80)=""/244}, 0x18) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000a80)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x6, 0x4, 0x8, 0x80, 0x0, 0x4, 0x4, 0x0, 0x80, 0x3, 0xc8a, 0x5, 0x2, 0x80000000, 0x2, 0x4, 0x10000, 0x7, 0x0, 0x2, 0x880, 0x0, 0x1, 0x50, 0xe814, 0x1000, 0x2, 0x1f, 0x8, 0x5, 0xff, 0x10000, 0xfffffffffffff5d7, 0x9, 0x6cc8bbc7, 0x4, 0x0, 0x9, 0x5, @perf_bp={&(0x7f0000000540), 0x2}, 0x2, 0x30, 0x864, 0x5, 0x966, 0x80000001, 0x2}, r3, 0x5, r0, 0x2) 2018/03/31 09:45:56 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r2, &(0x7f0000000300)="46f23bdc94558fe9ec69561bc83a238572bf05deecb66a24c7c72efcb7cfd322e789303382b9aa6cf4acb1", &(0x7f0000000340)}, 0x18) getpid() mount(&(0x7f0000000880)='./file0\x00', &(0x7f0000000e00)='./file0\x00', &(0x7f0000000cc0)="6f70656e70726f6d66730068aa24c744f1b3b438871755e97a0e8b06a46332803ad955853d68cde01d952d6f8dbe0fd8463f4fad528b2be188f24ed8120530ca02b7f33dfcc6e7380aaee788e124cd5647d45b847ce5a5450bbd10503d5369072c01c14e53a58e51a0db56b69231c8d94a54a3406feb6cc107c6bb444781de016a4ad0dc748a8cff5939c1685f2b859a87733b492abda3a1c7681533ca62ed46d010da3f", 0x3dad6dcbc9b5ef49, &(0x7f0000000bc0)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8c87decda76eddc22f807dea85d27bd317bb536c6aa4a3238024ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0xffffffff, 0x5, 0x1, 0x4, 0xffffffffffffffff, 0x9}, 0x2c) gettid() r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r4, &(0x7f0000000700)="e23515f8268e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07a547ca9484c3b38617bd323c5a2d2732085a6031838d3c24336ee6c924edfc6997eb4766d"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000440)={r4, &(0x7f0000000400)="a3b9"}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r4}, @exit={0x95}], &(0x7f0000000640)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r3, &(0x7f0000000340)="f4947e43f22a631e520a9280617d5ec96ff36d1e81fcc0ffdc7979298714c0eb3a20718aaebd", &(0x7f0000000a40)=""/215}, 0x18) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:56 executing program 2: socketpair(0x0, 0x80000, 0x4, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00'}, 0x10) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000280)=@generic={0x10, "22ef455e378f3a17a869d3fda93bd342586be6aa532aff024c3263c8903274aa8be75f5385e590a0357546037f995e7f97655d6b130f637a59df03ece87036f874a6031bc564f6b558e983c17c093089b7cbef197da1ce98198f56421717bbe09a90bbb829bfd54a090ff7f8f2a6f1dc4fe40e69441fe8008a3b7a3773e8"}, 0x80, &(0x7f0000001780), 0x0, &(0x7f0000001800), 0x0, 0x20000080}, 0x40) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000500)) getpid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r1, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r2, 0x4) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001d80)) mkdir(&(0x7f0000001dc0)='./file0\x00', 0x142) bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x1}, 0x2c) socketpair(0x8, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001bc0)={0x0, 0x70, 0x0, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x0, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0x0, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x0, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, 0x0, 0xc, 0xffffffffffffffff, 0x1) r5 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x0, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0x0, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r4, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r4}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x0, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r4, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x0, 0x1, 0x3, 0x1, 0x6, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x1000, 0xb36, 0x7, 0x0, 0x8a, 0x40}, r5, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000003c0)) recvmsg$kcm(r4, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000680)='./file0/file1\x00', &(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)='aufs\x00', 0x8, &(0x7f0000001f00)="62314d6edd70ce2d8fe1794b762352023f3716a622508def3e247dac3f72e9398d7cf3f821e44d736f95fb02b757ea17f7cfcf09bb039e8a278c25b949c176cfd98b2f1a759124b5593ae7d2c19b3da5f3e5529e472732d6e0df3ac6608b25618c9e3ae9847d99caee1e0d194548cd7c6e46729486bc83aa733fc440c68179f45a9fb7f7de5cf73235cabc2e3630f7") 2018/03/31 09:45:56 executing program 0 (fault-call:18 fault-nth:53): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:56 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x6, 0x80000, 0x1b7, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000a80)={r1, 0x28, &(0x7f0000000a40)}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r2, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:56 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 297.364664] FAULT_INJECTION: forcing a failure. [ 297.364664] name failslab, interval 1, probability 0, space 0, times 0 [ 297.376068] CPU: 1 PID: 22388 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 297.383346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.392699] Call Trace: [ 297.395292] dump_stack+0x194/0x24d [ 297.398919] ? arch_local_irq_restore+0x53/0x53 [ 297.403572] ? __save_stack_trace+0x7e/0xd0 [ 297.407886] should_fail+0x8c0/0xa40 [ 297.411584] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 297.416672] ? kasan_kmalloc+0xad/0xe0 [ 297.420537] ? kmem_cache_alloc_trace+0x136/0x740 [ 297.425358] ? __memcg_init_list_lru_node+0x169/0x270 [ 297.430524] ? __list_lru_init+0x544/0x750 [ 297.434737] ? sget_userns+0x6b1/0xe40 [ 297.438609] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 297.443351] ? do_mount+0xea4/0x2bb0 [ 297.447050] ? SyS_mount+0xab/0x120 [ 297.450658] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 297.456008] ? find_held_lock+0x35/0x1d0 [ 297.460060] ? __lock_is_held+0xb6/0x140 [ 297.464114] ? check_same_owner+0x320/0x320 [ 297.468423] ? rcu_note_context_switch+0x710/0x710 [ 297.473341] should_failslab+0xec/0x120 [ 297.477304] kmem_cache_alloc_trace+0x4b/0x740 [ 297.481868] ? __kmalloc_node+0x33/0x70 [ 297.485821] ? __kmalloc_node+0x33/0x70 [ 297.489774] ? rcu_read_lock_sched_held+0x108/0x120 [ 297.494774] __memcg_init_list_lru_node+0x169/0x270 [ 297.499774] ? list_lru_add+0x7c0/0x7c0 [ 297.503731] ? __kmalloc_node+0x47/0x70 [ 297.507694] __list_lru_init+0x544/0x750 [ 297.511743] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 297.517613] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 297.522622] ? lockdep_init_map+0x9/0x10 [ 297.526669] sget_userns+0x6b1/0xe40 [ 297.530361] ? set_anon_super+0x20/0x20 [ 297.534320] ? put_filp+0x90/0x90 [ 297.537755] ? destroy_unused_super.part.6+0xd0/0xd0 [ 297.542839] ? alloc_vfsmnt+0x762/0x9c0 [ 297.546793] ? path_lookupat+0x238/0xba0 [ 297.550834] ? mnt_free_id.isra.21+0x50/0x50 [ 297.555225] ? trace_hardirqs_off+0x10/0x10 [ 297.559528] ? putname+0xee/0x130 [ 297.562966] ? cap_capable+0x1b5/0x230 [ 297.566839] ? security_capable+0x8e/0xc0 [ 297.570974] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 297.576143] ? ns_capable_common+0xcf/0x160 [ 297.580448] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 297.585616] mount_ns+0x6d/0x190 [ 297.588964] rpc_mount+0x9e/0xd0 [ 297.592313] mount_fs+0x66/0x2d0 [ 297.595661] vfs_kern_mount.part.26+0xc6/0x4a0 [ 297.600228] ? may_umount+0xa0/0xa0 [ 297.603837] ? _raw_read_unlock+0x22/0x30 [ 297.607963] ? __get_fs_type+0x8a/0xc0 [ 297.611833] do_mount+0xea4/0x2bb0 [ 297.615353] ? __might_fault+0x110/0x1d0 [ 297.619399] ? copy_mount_string+0x40/0x40 [ 297.623617] ? __check_object_size+0x8b/0x530 [ 297.628097] ? __might_sleep+0x95/0x190 [ 297.632059] ? kasan_check_write+0x14/0x20 [ 297.636276] ? _copy_from_user+0x99/0x110 [ 297.640408] ? memdup_user+0x5e/0x90 [ 297.644099] ? copy_mount_options+0x1f7/0x2e0 [ 297.648578] SyS_mount+0xab/0x120 [ 297.652014] ? copy_mnt_ns+0xb30/0xb30 [ 297.655891] do_syscall_64+0x281/0x940 [ 297.659760] ? vmalloc_sync_all+0x30/0x30 [ 297.663886] ? _raw_spin_unlock_irq+0x27/0x70 [ 297.668360] ? finish_task_switch+0x1c1/0x7e0 [ 297.672838] ? syscall_return_slowpath+0x550/0x550 [ 297.677758] ? syscall_return_slowpath+0x2ac/0x550 [ 297.682672] ? prepare_exit_to_usermode+0x350/0x350 [ 297.687673] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 297.693040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.697873] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 297.703044] RIP: 0033:0x454e79 [ 297.706213] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 09:45:56 executing program 4: socketpair(0x2f9f3d87429f3401, 0x4, 0x9b25, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r0, &(0x7f0000000200)="b32f449a16233d581dea3dc1a6e67f0cb76f3b04f7ea2191593e0e56a6ecb81ae8e02cabf8025c2dfd2de158bca1adbfd3ba4703224a23051da56a7098b923ab8ac039c6cb3ba843a0d4f9c464a4a0907ce607b404b1e5e8ed2c42b7d03ec447b3f48ef5e298a6d546bf99c8675d", &(0x7f0000000280)=""/48}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x2, 0x9a, &(0x7f0000000400)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x1f, 0x7, 0x0, 0x1, 0x1c}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000300)=""/251, 0x41000}, 0x8cf11171) 2018/03/31 09:45:56 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x2, 0x80002, 0x10000, &(0x7f0000000a80)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000b00)) r2 = gettid() r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') perf_event_open(&(0x7f0000000b40)={0x0, 0x70, 0x8, 0xea, 0x9, 0x3f, 0x0, 0x4, 0x90000, 0x5, 0x3, 0x1, 0xe5, 0x7f, 0x66, 0x24c4, 0x7, 0x9, 0x1ff, 0x9, 0x7fffffff, 0x8, 0x0, 0x4, 0x6, 0x216d, 0x6, 0x101, 0x8001, 0x7fffffff, 0xb54a, 0x8, 0x800, 0x1f, 0x80000000, 0x3, 0x0, 0x3, 0x0, 0xb60, 0x4, @perf_config_ext={0x2, 0x2}, 0x61, 0xffffffff, 0x5, 0x3, 0x7ff, 0x7, 0x4}, r2, 0xe, r3, 0x9) mkdir(&(0x7f0000000ac0)='./file0\x00', 0xa1) sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@rc={0x1f, {0x40000, 0xffff, 0x3427, 0xfffffffffffffff8, 0x100000001, 0x4}, 0xffffffff00000000}, 0x80, &(0x7f0000001200), 0x0, &(0x7f0000001080)=ANY=[], 0x40, 0x10}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0xa, 0x4, &(0x7f0000000d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@jmp={0x5, 0x1, 0xe, 0x0, 0x5}, @ldst={0x0, 0x1, 0x2, 0x4, 0x3, 0xfffffffe, 0x4}, @ldst={0x0, 0x2, 0x6, 0x5, 0x3, 0xffffffd2, 0xffffffffffffffff}], {0x95}}, &(0x7f0000000bc0)="021f6241c1892c42e2a57066ce6a8864b534638df3766ec32d6f896c0fb61f42c337d119fbbe81909a6fdbd01966d17959203841c497b38942ab7ce0786290a675dd1c5815b190576f55f580b3f26a5db52c91d372a0461e45fdabe975df926bd32464989d5238f98ecf6999cc5fcd00a5212843606db547908748fd57e576f7aa4200942fca34e6d437f113328a2c0fb3bb9216995d37bfd21558c0ba3b487033e28ef3ecb710d9f302d1b3a0cb480a4ff21146f1c5109116be98b45093b606cb2ace321f9bd3da0e575b8854eaf72ebb04203845062ea1fc181408dc", 0x200, 0x13e, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000d80)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 297.713902] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 297.721149] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 297.728400] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 297.735652] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 297.742902] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000035 2018/03/31 09:45:56 executing program 0 (fault-call:18 fault-nth:54): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:56 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000001340)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000001380)="73750730b053b4acb3a6e93bd8da3b84c679737600", 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") r2 = gettid() perf_event_open(&(0x7f00000013c0)={0x5, 0x70, 0x7ff, 0x1800000, 0x96b, 0x401, 0x0, 0xffff, 0x200, 0x8, 0xf081, 0x85, 0x7, 0xe41b, 0x8, 0x2, 0x0, 0x1, 0x25e44b81, 0x8000, 0x8, 0x100000000, 0x6, 0xa8f, 0x1f, 0x523f, 0x9, 0x100000000, 0xe2, 0x800, 0x8, 0xe58d, 0x8, 0x3, 0x5, 0x8001, 0x0, 0x3, 0x0, 0x2, 0x3, @perf_bp={&(0x7f0000000040), 0x6}, 0x4080, 0xfff, 0xcd90, 0x5, 0x6, 0x10001, 0x3}, r2, 0xd, r0, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r3, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000a40)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000001600)="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", 0x1000}, {&(0x7f0000000a80)="13f28868d3e361df48a3a53903f5f6b30b550e11af8f361d899b709ec3e2324b16bbda91b43b77c17112d3b20ec2fed8de5b09c612586791bdf7da2ec8fdde82ad6fb699b61707a45d80e37e575b6420fbd5e56a9f2840dc2ccaf3782c8a1c565e122f70ceedb07aa17b64a77438b6dbe87cbb26d83b1f6057211c6c3cd559808ed252f8ef6c4543dcbd9645a15d8ef5253e3d65b062c2bb8b38565c025404c07dba509f029c9194bd2b504305b47ee204950bc361601b74dc9edfd5322d156f54b47558c1eca582fd2c07d985d58f861f06d9f556de7f107a4bea7bac2c10b25d", 0xe1}, {&(0x7f0000000b80)="24619bd0f538e75368d56a05f074003ea5c16ae909e078472aac0cbb4f9e459847dc0f2c5113faf3bd6577f6", 0x2c}, {&(0x7f0000000bc0)="c09dca9aa162779dab196a981b8fb34b708a42e8c5e8ee5bf098f6d7d1fdaab7cf49b6aaed36355b06eb73d4d3cd210e7bea6407389fec250c185c334b58b2fab59b91cc075be793bf40fada36ac4483dd9eaf21de0a262fd943571d51ad3fe5bb26b4edbc0e52d35ab0809928c0d769bb1e98425d49efe49a6de96918f6f2f1ebd6dd1d9fe7f1288f3e9e1a149c03378172", 0x92}], 0x4, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) socketpair(0x2, 0x800, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000d00)=""/241, 0xf1}, {&(0x7f0000000e00)=""/206, 0xce}, {&(0x7f0000000f00)=""/199, 0xc7}, {&(0x7f0000001000)=""/189, 0xbd}, {&(0x7f00000007c0)=""/60, 0x3c}, {&(0x7f00000010c0)=""/111, 0x6f}, {&(0x7f0000001140)=""/234, 0xea}], 0x7, &(0x7f00000012c0)=""/42, 0x2a, 0x4}, 0x1) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 298.016855] FAULT_INJECTION: forcing a failure. [ 298.016855] name failslab, interval 1, probability 0, space 0, times 0 [ 298.028317] CPU: 0 PID: 22428 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 298.035581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.044915] Call Trace: [ 298.047488] dump_stack+0x194/0x24d [ 298.051092] ? arch_local_irq_restore+0x53/0x53 [ 298.055740] should_fail+0x8c0/0xa40 [ 298.059428] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 298.064512] ? trace_hardirqs_off+0x10/0x10 [ 298.068814] ? find_first_zero_bit+0x93/0xe0 [ 298.073199] ? perf_trace_lock+0xd6/0x900 [ 298.077322] ? trace_hardirqs_off+0x10/0x10 [ 298.081619] ? find_held_lock+0x35/0x1d0 [ 298.085673] ? __lock_is_held+0xb6/0x140 [ 298.089722] ? check_same_owner+0x320/0x320 [ 298.094028] ? lock_downgrade+0x980/0x980 [ 298.098166] ? rcu_note_context_switch+0x710/0x710 [ 298.103079] ? find_held_lock+0x35/0x1d0 [ 298.107122] should_failslab+0xec/0x120 [ 298.111074] __kmalloc+0x63/0x760 [ 298.114505] ? lock_downgrade+0x980/0x980 [ 298.118640] ? register_shrinker+0x10e/0x2d0 [ 298.123030] ? trace_event_raw_event_module_request+0x320/0x320 [ 298.129067] register_shrinker+0x10e/0x2d0 [ 298.133280] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 298.139057] ? memcpy+0x45/0x50 [ 298.142316] sget_userns+0xbbf/0xe40 [ 298.146001] ? set_anon_super+0x20/0x20 [ 298.149964] ? put_filp+0x90/0x90 [ 298.153396] ? destroy_unused_super.part.6+0xd0/0xd0 [ 298.158480] ? path_lookupat+0x238/0xba0 [ 298.162531] ? mnt_free_id.isra.21+0x50/0x50 [ 298.166921] ? trace_hardirqs_off+0x10/0x10 [ 298.171223] ? putname+0xee/0x130 [ 298.174661] ? cap_capable+0x1b5/0x230 [ 298.178525] ? security_capable+0x8e/0xc0 [ 298.182651] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 298.187815] ? ns_capable_common+0xcf/0x160 [ 298.192120] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 298.197290] mount_ns+0x6d/0x190 [ 298.200633] rpc_mount+0x9e/0xd0 [ 298.203972] mount_fs+0x66/0x2d0 [ 298.207318] vfs_kern_mount.part.26+0xc6/0x4a0 [ 298.211881] ? may_umount+0xa0/0xa0 [ 298.215490] ? _raw_read_unlock+0x22/0x30 [ 298.219615] ? __get_fs_type+0x8a/0xc0 [ 298.223486] do_mount+0xea4/0x2bb0 [ 298.227005] ? __might_fault+0x110/0x1d0 [ 298.231050] ? copy_mount_string+0x40/0x40 [ 298.235256] ? check_same_owner+0x320/0x320 [ 298.239566] ? __check_object_size+0x8b/0x530 [ 298.244059] ? __might_sleep+0x95/0x190 [ 298.248022] ? kasan_check_write+0x14/0x20 [ 298.252236] ? _copy_from_user+0x99/0x110 [ 298.256360] ? memdup_user+0x5e/0x90 [ 298.260055] ? copy_mount_options+0x1f7/0x2e0 [ 298.264527] SyS_mount+0xab/0x120 [ 298.267953] ? copy_mnt_ns+0xb30/0xb30 [ 298.271815] do_syscall_64+0x281/0x940 [ 298.275674] ? vmalloc_sync_all+0x30/0x30 [ 298.279802] ? _raw_spin_unlock_irq+0x27/0x70 [ 298.284277] ? finish_task_switch+0x1c1/0x7e0 [ 298.288743] ? syscall_return_slowpath+0x550/0x550 [ 298.293647] ? syscall_return_slowpath+0x2ac/0x550 [ 298.298552] ? prepare_exit_to_usermode+0x350/0x350 [ 298.303542] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 298.308881] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/31 09:45:57 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0xd, &(0x7f0000002000)=[{&(0x7f0000001080)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xb5}], 0x2, &(0x7f0000000180)=""/105, 0xfffffffffffffeb6}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x401, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000050000000000000000000000000000c5a6d134c53d390f5069d01f544263d4a8ff707a1cb507f3e1ed67ff7fa20d169ab4288e27fe78e59990c89185223b8766b37ef939fca9249d85e4df48220a28bdc06ec70f9cc26d218bc57c9f6343f65b0ea889182d625d649a8566a374000f5aa4070d927f6b77c8c4af8dcf75d16671594d3616a6adcf29f6e04419248c62e0a46b4cac14bc7780cc688f65a070f92e3142da250642c8dbae5114a7b7a9d04f7d30e0b3e19cc5293fec2d0339c42aead1b0000000000000000000"], &(0x7f0000000080)="73797a6b616c6c9dcd166fad007200", 0x3, 0xffffffffffffff67, &(0x7f00000003c0)=""/195, 0x0, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xe, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f663", &(0x7f0000000340)=""/90}, 0x28) 2018/03/31 09:45:57 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 298.313702] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 298.318864] RIP: 0033:0x454e79 [ 298.322031] RSP: 002b:00007efdf25fec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 298.329722] RAX: ffffffffffffffda RBX: 00007efdf25ff6d4 RCX: 0000000000454e79 [ 298.336964] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 298.344209] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 298.351452] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 298.358693] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000036 2018/03/31 09:45:57 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) close(r0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x7ffffd, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000b00)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) mount(&(0x7f0000000640)='./file0\x00', &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='hpfs\x00', 0x0, &(0x7f0000001600)="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") bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:57 executing program 7: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001880)={&(0x7f0000001840)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000018c0)={&(0x7f0000001900)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="85000000220000000700000000009b009500000000000000"], &(0x7f0000000280)="73797a6b616c6c65720001be826e8f833152f795b4d9f4bc3ea582523aed371b084fccfc3d2ef2cbe65d30642ca8dcd0f8479be52e66937908f1d8112489e8099d9d4edb806d81189c0fbb6818d028546c35d3363d54db0db780f54977ae6359d617c1d233d8e18abfc75f9a76cd8e1f77583bc02f07a33de6f304e95db82fd4da55ebd25162df6f88e7d1bb0654ffb31e008967", 0x1, 0x99, &(0x7f000000d000)=""/153, 0x40000000}, 0x48) mount(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='rootfs\x00', 0x1000080, &(0x7f00000016c0)="748e8ae931aef183acf30835871d23debdcde7447dd7ddfcafd0840f61da94b8ebe91af6601e6cebb4ba0121e737e9d6021ecf57f7e7629c689e5a22e70101f8de96cc3f8143b034de14fe31b1206c5ba1403a21e86ae930c654f18af15e67ce5f8e8a9afa4073c6c6b47ca506d6c2e3dac70d26b732b28a92fd9b9abc27a189fd6251e0dc") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r1, 0x0, 0xe, 0xb6, &(0x7f0000000140)="227976ac0f08fd67c936835588a8", &(0x7f0000000440)=""/182, 0x4}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0xad, &(0x7f0000000180), &(0x7f0000000340)=""/173, 0x8001, 0x4}, 0x28) mkdir(&(0x7f0000000200)='./file0\x00', 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) close(r3) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0xa, &(0x7f0000000500)=ANY=[@ANYBLOB="000001f8ffffffffffff00003b5f3392b0f6f49bb69c9af539f505266e51e0390d19f4facba34108f9f9acd171d764ca86ab7bacb1d37596b64e4162a44fc1027ed69cdc98f313a398614ba117000000"], &(0x7f0000000480)='GPL\x00', 0x0, 0xfb, &(0x7f0000000300)=""/251}, 0x48) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000980)='./file0\x00', &(0x7f0000000800)="68356765746cdd06838b675cd5b2e35e848627b418bc46a2aca7508a71270ba60e179cf50eb1ebd5d6f2a152b14ba04557b4db311a507da6b1a538075aa06d34cb1bf931396427efd4610c", 0x200, &(0x7f00000001c0)) socketpair$inet(0x2, 0xa, 0xfffffffffffffffd, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a6276c8", 0x39}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000005c0)=0x7, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r7, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffff9c, 0x40042408, 0xffffffffffffffff) recvmsg(r6, &(0x7f0000000b00)={&(0x7f0000000740)=@vsock, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000880)=""/228, 0xe4}], 0x1, &(0x7f0000000a40)=""/140, 0x8c}, 0x0) socketpair(0xa, 0xa, 0x63ed, &(0x7f00000004c0)) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000100)=r4, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x0, 0x7ff, 0x1, 0x6, 0x2, 0x1, 0x6d43}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000001580)={0x7, 0xb, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, [@exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r8}, @ldst={0x3, 0x3, 0x1, 0x3, 0x0, 0x9ecaa37f6c90dc47, 0x8}, @alu={0x0, 0x8, 0x6, 0x9, 0x0, 0x1, 0x4}], {0x95}}, &(0x7f0000000400)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000580)=""/4096, 0x40f00, 0x1}, 0x48) 2018/03/31 09:45:57 executing program 0 (fault-call:18 fault-nth:55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg(r3, &(0x7f0000000cc0)={&(0x7f0000000400)=@ethernet={0x1}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000580)="4589496d6a3bfcccae07dc729c52ee6bdf10d9cf221f605c25f790103018703b9a67491f96c3f9f8d07204ee4adf21acce1afdaedaba1228b4d33c3fa702a46b1329a0e52eea6a7908fd375ace47", 0x4e}], 0x1, &(0x7f0000000700), 0x0, 0x40000}, 0x4044080) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x0, 0x0, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c741") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000700)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) close(0xffffffffffffffff) 2018/03/31 09:45:57 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x2, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x7, 0x9, 0x7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000ac0)={&(0x7f0000000a80)='./file0\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='cgroup\x00', 0x0, &(0x7f0000000140)="8c8062d0c31c274ef76d4484611987e46b71c95d56e544f91afcb6764921bb01da444e8b6850c5f04e4e36b219cade149589181f5934f38d4c5b2775bd3233596aee2a8fd7f609962e67910e8684e3304632ecbd83627372d07fbbea20177de4be79d7f1f0fb656104a5bf3b7ba474856fd43600fcc08b1f4d16068344ec1816d36412") r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffff, 0x101, 0x195dd959b195eae0}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x45, 0x0, r3}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xb, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f0000cd3000)='ramfs\x00', 0x1, &(0x7f000056a0e2)) mount(&(0x7f0000802ff8)='./file0\x00', &(0x7f0000b16000)='./file0\x00', &(0x7f0000905000)='devtmpfs\x00', 0x85030, &(0x7f0000e99f87)) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='./file0\x00', &(0x7f0000df2ffd)='\x00v\t', 0x7fffd, &(0x7f0000751000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000a40)={&(0x7f0000000640)='./file0\x00', r4}, 0x10) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:57 executing program 1: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r1, 0xd, 0x1b}, 0xffffffffffffff91) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x2, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x92) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x1) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r1, 0x9, 0x18}, 0xc) socketpair$inet6(0xa, 0x4, 0x5, &(0x7f0000000a40)) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:57 executing program 2: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x29, 0x5, 0x0) socketpair$inet6(0xa, 0x6, 0x2, &(0x7f0000000040)) r2 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000080)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000600)=0xfffffffffffefffc, 0x1000001ee) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000100)={r2}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)) socketpair(0x3, 0x4, 0x800, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r5, 0xc008240a, &(0x7f00000001c0)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r5, &(0x7f0000000200)="45ef734b9d37126e7f8ef0c8f948a5163855ee472b903bb033db8827dca61048f21474a76619d287cbc7b0a6e66d3f5d461370d89c32eb7d5e4166c678847d17adf4bb229611b0c2114ab06f5f6d98"}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r4) sendmsg$kcm(r3, &(0x7f0000001800)={&(0x7f0000000880)=@sco={0x1f, {0x4, 0x606, 0x9, 0x6, 0x8d, 0x894}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000380)="dd01e7e8cbc6405d873f86da80ccd15c02ed9c21af2682152c0d3b84d4a29d952e2102951694a78159fccb2a25be3b72a61e250322d72191b2add70e6ad1f6f54effe8399d114a0bc0400c335adf32fd53a944c54fe20b5a0caaade2e8f56f72b7f7bcfde5fe4e339887a6fb158c2ca9468dbeabad0e8cdb72951d3be0df7d1157dfb2d4b2fc9061959e2348bfaa5c07c4005ac4471920c27e63fc836ab3745ade470592d05383c0fcb57427a5131cd05a9fc61c51b57d4b480d6416dc0cad3595b2d73268fe70d4d3bd8842e037a8817bb1174b2187c2640561e763ce6b67ea0469b492c0d9c4c2fed45cca", 0xec}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="b800000000000000840000001d060000625735895c8a3f33af47679489dbc6c13f00066e9676d7eeae342cf80550dde132d22ef3c0adfcf9d8a123166d27f977a869c6e07c907da3410fab8eb5ff135b1618d56be9d3cfb33e36a9ed0e328ee66b0c15876d3793548b537373c988980b9c347e7542eafaa400a35948e11ac43fdb4ea3ef5de03efe00e74c50a6034b811b0c7e238aca7a0d9763807e408b9eb09b10ba7f2705104d8883d7449ca082ce60ff2c17503a3132f9c400000000000000000000"], 0xc4, 0x40044}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001980)={r2, &(0x7f0000001840)="fcf240685ad3ec3b5d8e250e4baa3d5957530ac0dc14a543e4e9daee797861d81769914522796837d854b4edddd388b2d9eef13b5b5fbaded68bc6877a9a8ad33f5d5d879b", &(0x7f00000018c0)=""/145}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001a00)={r5, 0x28, &(0x7f00000019c0)={0x0, 0x0}}, 0x10) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001a40)={r6, 0x8001}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001ac0)={r0, 0x28, &(0x7f0000001a80)}, 0x10) r8 = gettid() perf_event_open(&(0x7f0000001b40)={0x5, 0x70, 0xffffffff, 0xffffffff7fffffff, 0x4, 0x5, 0x0, 0x5, 0x8000, 0xf, 0xfffffffffffffffa, 0x9, 0x2, 0x5, 0x1000, 0xc4e, 0x0, 0x1, 0x0, 0x2, 0x7, 0xfffffffffffffffb, 0x8, 0x5, 0xe3a, 0xfffffffffffffff8, 0x7fff, 0x6, 0x8001, 0xdc5, 0x100000001, 0x10000, 0x2, 0xffffffff, 0x4, 0x2, 0x6, 0x0, 0x0, 0x4, 0x5, @perf_bp={&(0x7f0000001b00), 0xc}, 0x0, 0x8, 0x10001, 0x7, 0x1f, 0x6, 0x6}, r8, 0x0, r4, 0x8) r9 = perf_event_open(&(0x7f0000001bc0)={0x4, 0x70, 0x0, 0x81, 0xca, 0x3, 0x0, 0x8, 0x1d89, 0x4, 0xa08, 0x2, 0x81, 0xffffffffffffff7f, 0x11, 0x0, 0x1, 0x717, 0xfffffffff5bf85e4, 0x7, 0x6, 0x7, 0x100, 0x5, 0xffffffff, 0x9, 0x20, 0x47c2, 0x7fff, 0x1, 0x46, 0x2, 0x7a6, 0x0, 0x2, 0x6, 0x43, 0x4, 0x0, 0x7fffffff, 0x2, @perf_config_ext={0x8c, 0xd66}, 0x20000, 0x101, 0xe4, 0x1, 0x0, 0x3, 0x1}, r8, 0x9, r5, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x313f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x40082406, &(0x7f0000001c40)='vboxnet0]\x00') setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001c80)=r5, 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001cc0)={0xa, 0x5, 0x0, 0x7, 0x2, r5, 0x9}, 0x2c) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001d00)) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0xa395, 0x80000001, 0x30, 0x1ff, 0x0, 0x6, 0x8000, 0x2, 0x7ff, 0x9, 0x20, 0x6, 0xe6d, 0x100, 0x2, 0x9, 0xfffffffffffffffb, 0x6, 0x8000, 0x8, 0x5, 0x65, 0xdf, 0x9, 0x2, 0xb5, 0x1, 0x3, 0x8, 0x9, 0xd9, 0xcbe0, 0x7fffffff, 0x1, 0x1f, 0x2, 0x0, 0x80, 0x1, @perf_bp={&(0x7f0000000480), 0xe}, 0x0, 0x5, 0xffffffff80000001, 0x7, 0x6, 0x3, 0x7}, r8, 0x5, r4, 0x3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001d80)={&(0x7f0000001d40)='./file0\x00', r7}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000001dc0)='./file0\x00', r10}, 0x10) 2018/03/31 09:45:57 executing program 4: socketpair(0x1, 0x0, 0x7, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000001280)={r2}) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001180)={&(0x7f00000011c0)='./file0\x00', 0x0, 0x80000000000000e}, 0x28d) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000000)='./file0\x00', r3}, 0x61) r4 = gettid() perf_event_open(&(0x7f0000001300)={0x0, 0x70, 0x5, 0x7, 0xcd1, 0x2, 0x0, 0xe88, 0x800, 0x2, 0x90000, 0xfe, 0x1, 0x7f, 0x6, 0x7fffffff00000000, 0x7f, 0x78, 0x1, 0x8000, 0x9, 0x7fff, 0x1, 0xf678d19, 0xb6, 0x6, 0xff, 0x100, 0x7, 0x4, 0x8, 0xf895, 0x10000, 0xfa6e, 0x7ff, 0x8, 0x4, 0x20, 0x0, 0x5, 0x6, @perf_bp={&(0x7f00000012c0), 0xb}, 0x1, 0x10001, 0x3, 0x0, 0x8, 0x1, 0xa691}, r4, 0x8, r0, 0x8) mount(&(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)="000009b8", 0x804022, &(0x7f0000000180)="236f589bc391ec020c4b1ae3e13cadf71f3cc18f423b0e7684cdbaf5ee05f65c1cc5d617b0c283fd30a444") socketpair(0xa, 0x80003, 0x7ac0, &(0x7f00000001c0)={0x0}) ioctl$PERF_EVENT_IOC_DISABLE(r5, 0x2401, 0x98) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001240)={r5, &(0x7f0000000200)="971317a6be3e8198c91478924f0c86b3bbdc59b2ddf19ec1420687c1cbeae5402388729ba3ced1c2f7575b41b7f2d7d2c6a30c97ab46581a9766dcfdb52cddea3e86af553aeb13a0d1ba5549b427065f4ad481a1dc91d1ad2099a919dbfca05610b56ddf011200c40c730bb3b87f640ab1ab7ac477b41772ee79038c9c49e9b312ddcecf4962a28ec293c1c6aa01fa0954716115e04aa9406d8de6047e12cfbd79f7b8a98356f041781dc9313291426dc1306963ad0965c9ed97714ceb0a793c7fcccc97697c9f8756a2dc5328b57bc72cff9b78425fd735e588366c99a6876e55584856b1ab759a7739f9509f8f6e8820dbe53ecd7406a9f84734ee9a83ef9a4a665c8e4ecc7eeaeb8f2b6b70b36bcf50b5cc5414010e199c4dc80134a5bb424054c062d8cd954a641cbdfdb5c3a223eee189c3b32c6095a80f82db50e291ab053f5542fdfce3e1fc728f763d6da04643b5ae2817bc04ca7d844208532bf96f186ba6647e3604e586c03c7ebd2229aa04213d7c8ad4deb3454cbf874500b371c19651910b9fdfc0e084856ffa3e1c48f35590f9cbb3928fb9e60219616d93e60b61bc7cf8c28757378dcaa793c04edd34fec4729e715ce69e94e3a049e254c66af2d5ad6b54dd4ecb172168cbde7fc0f3430dc6f34168a0fa73cd98ee67119de2126fc85d108b347dfe851b912060231fe8759d970530b1b36c7bdd6e20704b67eb66c069a84172ed7f203a26311bf44c41ab5d8700cd7258a5d0c228af6a48e24c08c500cd4c3bc0ee00a005ddea4adb4eb184f1a823d24de000c156d5c63e997255b318be3961a47165500ed9a748276b9a8b3417fcc4c621194177877b385a5b5c6d679854cedff5169114dadfb44c721e83551df846ec0e820869a2624c3276bde04b5c97d60aa18e777a1dd27914ce2efdd863b97726bd823a9bd7285bcea3abcbe5df54634a0f2fb74068ccdebb8d03980eca70a7f0e1a6a5a334175f93a2dec6859f356859a9479c1faeed0572e5b64d6182c6ccc8cfa4beb1b491919dc212572995d02a33bb3a779ae870660f44274f130651f9c16302032e61ddda1bd791f9f48747a8cf7c9ead6fb18d327cd04e13c9cf722f0a5fcc0b449f6d9bc119d915d92787241534f8f978a47796487ec54a24d80232c4f75a99478c4b3fa323a4632f67439b0b4731a050c55de6197eb023271e6731a9d860ffd4fe74f2af84fae858b201e754f18d8af4e357cbed27af706f75b2f01ca7f74a37cf1c1f090cd4f750ea685c63a90b38cc0cc5512ebb3a710cabf13fe58d7ddf5a0cc8d8b969102bf9bb45b6e9b633bfa73c1e6c117dcbc387eaa9d2e78c1782e23ad8e54962f182cf12aff6682d6064c8cdde1c81d01f699a64537bb519318d9cd31fae9cc377c2ec4143a7504d3f9efccefd85e72ebcdd0bbb258a1036d59be52dcf7cc7ccc120129b5d89868b0a96c37d3f12d9df4a2f6b506de53cb21de890c378f824517eba67a61d3e462cc797e9c36061decfdfcc5641c78298e2cde66089415aa9b746235bb00c80304913ecbaa8af6a2819c13b695f18f6078624a0c0c110c4d17f3e1acc699155b0c9128631f0f3c1335ae181e825255a8c24b4b5395f2c3a18f6ecaf3dbcb173df1c48fd27211af76dbb91c5a074bdb63d636a620d924a5fc3846f522f450d96b14bde8bb90154f04453f54543f5800bd703f7ab47237478c76deb335bdcb888c8fd1e2c5cc2ef245768e647a0c7599c05ea36c9072a1911933eb06ac5323b5d1d4490abaa6f4c347dcac04f25a5b96965d388db752529cc2893faa2bc5f1f6f993fed1604b10b8b09ca65cfea82424e6b2d31aecbdbdcd2b4b7a5d0cfa1b9c78e844e3d967dc9eadddb9ee03d2e72e60eeaeb784c7b55fd24f1260961266bfb3ed25a67cfd1ef519ed0075929adaacee3334c424e9882ca42b912b6c2b008e873a53494514df38c95209207e93e989cb47dd557269f8bb4da0d6fbba9704a3a8f851d2c59b1f674b8de40118840ee756b39b690897361be1b111ec02ce30fc9fd6e03bb276a7963dd74a797719777b66e124bb38a2df303753e3b4df744ddd4fd648dec8e9fee629f76de5ba80eccd530c04855fc79e1f8312c5f37320824bc45102302d6cd7c47cdcdafbd15b77221eb9a23ebb77347069d8ef6ba0b6a5ba32098932f1893913b4af456818c663106fcb1c2d050dc9755eefb4c34e29a79ab7ccb91f97baaf75ea3d3214035221c6fe1c011eb10b62c65ae549d8b2180d6c3334d89e8474a013d2ce1cf31c487b07c31136e3f949f4db71d5ff119f48737305aeeca10bf8daa5caa8de97d073096449b908dc458ca4617de13dbfaae077cdfc87c14bf1b86016a83bad9c6fc70f2e21d5c6b7eb69b0b9f2bfe019cc294c11fbf7e26703839de89d7dd4d872045d9174f220ec37d382f4ae21c8f730002ed287f81997ca37def275e57c023731c9f6af9b11ac74bbad907588c251c175a81acf278bd707717704fb4c2f1ffabefbf6220b0723095202c3fcb3c20df03224d246cca26dcec0c648c5993d339b08c7633a71843da538d0c58a83627b25d45eef9041add1e924001eebdd442ecfc3b367e96b295982495bc8a9c543ee67270803ab3716bbc5a5ceaa9306fa4c330dbea3b96bc29fe0d701629d026838c91e4f64abc1e2a72f1a02a5681822fdc9b37d6a25d8b9c96eb9c5f5f14505eb81fc1f824c9eacd244221b523f37df3182921ee8acab4f5603a7084255caac33bed686c31b577c33b4fa5ecaa7032572a496c62a4520bc07409ba042143ea941038282d4dbd84b6601171c5c46b752379b2999fa1a555d9bf1b2e32c935ce126a94bd572eef17de7479412e91e5999ead5d05d0ede5a80946e3d8d58c60d2831ee3bbb8bcd1236c9a9a0e8409b473d491777bd9bc36b77db00ae00fd9cb95e0ca7e8d6173983504d27a41f0acce8791cfc02a1a1eb94d70da977339321a1d0b74f521f87c8eb9b56b65a0dd89584c11539ee5916bd4d75d232fa26388382629b02e8c7e0ad429eb41929eac611d27a710f2c2eaf2fc7eee7a4f88f51952ceb7127614e3536def841841e3fa0332359193db3b31d9e5dad5deda6f87637790081599ffe521d8539c3cab3caeb0062bdb88c29ee59d4524b757da9c5d0909614c4cb2809cbc931c1c8002b317afae2c689b40ce6dc8dd4b490e2a5789a3d84670d2802e78681dba14f4461c99b6840e940fdb86a0748a5b96940f84e15a90e63560421e248f6b0c194180c162ad6aae5aa464bdd208dedfe7e9d2ca59662543e7d59464a3593ecf33202ef9086d308bb953e71df85b25b3fc508d54494938f4a3a82a42d60d9776bde8f108c2edf50c1db764b483182c01e94a8b91e0a9c6782c1576ec09fd35fab4492f932ebc1b0b60d93da4c0252218043fcf9ef7549744d90555e0bcef0dd99c80bb5077b3ed94bbb34dad9379050388a9adfd6d9757701c04045b76e54b50962f3ac519b7d31c5339f0833b7cdd0151a9adc1657fd78ab76c6cb9e8a1bc6f97a8f805f3de8c393de7838923fa4830b3071d62132b000de5875d39f336b2ab6f8c30df7b7c21cc5f99f36fb8421c121b4f64cb42f560484a827847b855ec4d96e63afc2f518de7117fcca5c2779b2c8122fc85e3a598febe93cd920a908d9540f95a988ec5dc49bd996e330649ae178e4f4f60c33d3b43f64d113e4ce87304277692bce62fe2d6a200aefa30bcb5a0bda1c0c79523bf792b01721c70543c989c84580f9b951c9b0aa39050a93fb5b2abbe2a3f6df951fbd6de679e18585a27ea7f81bf4ac6dc28149a3070ff763d7eb434f4f48391d1f909b0d546292233bb6eed498b87c6e468c4bae996c74abca874c6d29d4d51defccc81c66e8e0fa6c943e348592283a67f9aaa2f57ace41faaeae630ed1e45ad434bb4fc66dc91eacd48f4eb1765456091a1c0c38e12d81188894afbb743f30c2ae2f899d9909095b84fc68b137b49203cd00c205de5fd79a3a57083970638b2d934c40069625694b7ad83d6133491d2009afe613b5ae8dbd6a46b51e43c670b4c1c3ec7e69b2403c30bd56ce816474cd052d1d3b1b3d643099937fb731676151836e51ed28a9bc9cfe23e632375ffd11a1e8fbe45254f3424826f4fb276c1d803709f0834a9e70ee8d3d9b833ac9e850a4fbdfc5ffa3d0c567877d3ca0883bb80d03fdd077d97ecfb66a63cb7e1789eefb06d64595e56241d05fa7f2a344e3f117e3ba7f294fd4570f2a35a005a685c3ed609268694b127aa0812823faebac77f85ef8aeb47b9bebc2ba537a7a10bda68f798628fe0e2947276f6f259afbcb67c96a51c39735e29a8b8c40f146f170f6063d37cd4556e92e761fc87f19253d3d8a83dc609fea16c104b9e7676769271f0c1b84d2363aa8647bfcae5e93e349fb788f73855720d944b62d54bcc605d336be60fad8029b8371e1270a0afde778f9652ca188c069f24daefd4332ac4a45e2797038ae14a25c84af2dec346c80dfe90adeb21c8d5b2e5751ddd07de77530a969cded30f7d57ff9d3822397b70e8e17b5860fc48486d4233cd0a33b9f9eb5a5d807e390dc43338aa9c276ed1dba1f2caf02389d5ae9befc0a25e0a1abf50e94ab40f8b503149b0f12f1de2c7faac64321c3da83edfeed8122a89d2cd068ae2dc1ab5608a62843873f01f99ba397305e318ccdf8cb1149d035fc0817a1f93257b377f3ce4842f069d6e8a625d654d13dbe229420ae4fb38d5cbaa55aa7438d26e82d89572ee1e4b57f77c8b94bc23d5bca5bd1e29b54d77cf3caae14a2f9fc640784b864a2d83961e955e8c8ebf6d8715637fe83d11be7086e49e831cf8ffb360a37227fd898042ca4b726c3962777d92eb986cec38dedc75cdc8f2f7d89a0e988f0f267cb0b1898ae06fc1434583a026d464c56f33811a0a72a40b50c3bdb8334c2c11b01f8c77db6bc87d4a300f0391439f51c4a98d021ae8004ae3d1adbb1059ae69af25e2bf7130f11081db985459e9bd433437403283cbe8508f657fb7b3f0199da37ceb45508afd54da50c10ab21bf7bdde224e809e192dd77a33d862b6507d253ee2d531a2fddfeab5c85ea4a3b6de72d0e1caa0f941c88bbdc6c28beae508afd6bb0ca541e84dea04643cb8575d0dc4dc2cacda77fc2e242da0978bcc55074dff0b4abfedc62e039006e61b5de69585f9a9562b4ee2a572fba5cecdebe8e0543eaca3a6d2836c8f156fccd75b9e697b269ef6918e68c1e9e3cbd4683e4a39bccf97be259b3fb3b2312c77529690c764998a45fcec5f2b3b21a178ee863681e4ee276a9f2d7b1353e9c753540bfe65b8184f446667b09ef242ee8e379b94cd819be971d8f4f9ab4613f1cf3d69fb7b773f610a58dd4f37cf87d4e62ef038bdccc18c36dd6aa60463c17746fb0f13ed61e511be1e125bbdb74ec6aa1e8b31550581115af91cc587ffb21c25a252dada52d3d9d196d40108f9aa06b2a859b2422ea41991bcd016248f86692af4a8278e468ec4941fd0cbba1af08e4718d20dbe9826616420cb9796e85ea0a57aa4983593ff13a94d1fad48a822242b6152dc23790a29aff49ad94502d849b9", &(0x7f0000001200)="55fe"}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r3, 0x28, &(0x7f00000000c0)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000c47fec)={0x6, 0x4, 0x6879, 0xb, 0x0, 0xffffffffffffffff, 0x0, [0x4]}, 0x2c) 2018/03/31 09:45:57 executing program 3: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7f") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x0, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000780)={r2, &(0x7f0000000700)="043615f8260e84fedc0795e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") 2018/03/31 09:45:57 executing program 6: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='sysv\x00', 0x0, &(0x7f00000001c0)="63e899c8a19fe28d3ded98a29ff87e40742eaa74c959b1ca5f995eafafe1c5ca206454be5a6b6b740ae18ac4a4a33752fe95eaf467f3850faa2da126d7fe0b44ae8f39c2424ae259e1073f547af70a926ed252c8f687c039390f031299ca85e634f0b5771f4f30255deb431e61c809b82bae90705523d4193dcb926ead23787da2542710c76f2caaa6ff8dd97bdc4af469f699cef52ebdb949e0dc98bc81e451dd56d929d53e7466320018814079fa04068724cb9ba53dd5c48489b036753af979d846af7fa1") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000800)={r1, 0x1f, 0x1b}, 0xfffffe31) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='openpromfs\x00', 0x800000, &(0x7f0000000380)="3807f874e84ff96337abf190b9a73a45a4ab1db7cb72b71eb0b2d630bfca5082e060981d93c42ed13d5e3bae906839b49a59cf7def0876dedb01a3cecf971b9a8087decda76eddc22f807dea85d27bd317bb536c6aa4a3238064ef9d4b366e687c5f71c70e8e45e4f5cae2b261ce596a8394c47ae691b1ee1a786caf96684ac2f2c2b97d4589c0fcd9391a331c9561d623450b0528d8beee8bdf4d97a2fd117c7a1b6cbb704d4ac40e7d4b10ba56ca09269db1101c0738f10ed05632df3cc833593e83cfb582eb28f21f8136f432") gettid() r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xf, 0x4, 0x4, 0xd7, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000640)={r2, &(0x7f0000000700)="0436150000000000008000e61276752313f714f6ac5f7c06728d1b7b161fbdb8eaa86383de2dd5d3fa45a4b659f2af658421be446b5230884969c02687bfc222ccefd07ca9484cc5a2d2732085a6031838d3c25336ee6c924edfc6997eb4766d56ec"}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000007c0)='(cgroupcgroupvboxnet1keyring]&\x00') sendmsg(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001280), 0x0, &(0x7f00000012c0)=ANY=[], 0x0, 0x14}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x4, &(0x7f0000000840)=@raw=[@map={0x18, 0xb, 0x1, 0x0, r2}, @exit={0x95}], &(0x7f0000000880)='syzkaller\x00', 0x200, 0xef, &(0x7f00000008c0)=""/239, 0x41000, 0x1}, 0x48) mount(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x83, &(0x7f0000000540)="dac3fcaa26f34aa37b1e16f5d6bbb45731a61e93eeeac604bf8593e4c88f083c1e53cff230590209d9ec1238c02763fae74cf9494a46329de637ba4013bdf3688bc6bbfafdd877a0a9d262b914ab6d5f13dbdd0b465b50638c693eca7129d695b847248edad4b744fa321243a0d045cb69cacbdb64b1cd7c8061a45fb3d3786cb8cab0cfed58375d8cdbb6379f8795a99cd714ce7db0d62c43dc439b193ea5568adece2a7990ba5af9ec8401ed62ea40f9f1743434c633eae593b6f31085050ad5268d") [ 298.544554] ------------[ cut here ]------------ [ 298.549405] refcount_t: increment on 0; use-after-free. [ 298.554917] WARNING: CPU: 0 PID: 4438 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 298.562623] Kernel panic - not syncing: panic_on_warn set ... [ 298.562623] [ 298.569978] CPU: 0 PID: 4438 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #43 [ 298.577155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.586505] Call Trace: [ 298.589073] dump_stack+0x194/0x24d [ 298.592683] ? arch_local_irq_restore+0x53/0x53 [ 298.597335] ? vsnprintf+0x1ed/0x1900 [ 298.601185] panic+0x1e4/0x41c [ 298.604363] ? refcount_error_report+0x214/0x214 [ 298.609107] ? show_regs_print_info+0x18/0x18 [ 298.613589] ? __warn+0x1c1/0x200 [ 298.617034] ? refcount_inc+0x47/0x50 [ 298.620814] __warn+0x1dc/0x200 [ 298.624074] ? refcount_inc+0x47/0x50 [ 298.627854] report_bug+0x1f4/0x2b0 [ 298.631507] fixup_bug.part.10+0x37/0x80 [ 298.635547] do_error_trap+0x2d7/0x3e0 [ 298.639429] ? vprintk_default+0x28/0x30 [ 298.643470] ? math_error+0x400/0x400 [ 298.647250] ? printk+0xaa/0xca [ 298.650506] ? show_regs_print_info+0x18/0x18 [ 298.654989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.659816] do_invalid_op+0x1b/0x20 [ 298.663509] invalid_op+0x1b/0x40 [ 298.666942] RIP: 0010:refcount_inc+0x47/0x50 [ 298.671325] RSP: 0018:ffff8801a24ff860 EFLAGS: 00010286 [ 298.676669] RAX: dffffc0000000008 RBX: ffff8801a140e144 RCX: ffffffff815b423e [ 298.683916] RDX: 0000000000000000 RSI: 1ffff1003449febc RDI: 1ffff1003449fe91 [ 298.691163] RBP: ffff8801a24ff868 R08: ffffffff88583118 R09: 0000000000000000 [ 298.698409] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801a24ffaf8 [ 298.705658] R13: ffff88019cbb2013 R14: ffff8801a140e140 R15: ffff88019cbb2001 [ 298.712918] ? vprintk_func+0x5e/0xc0 [ 298.716730] sk_alloc+0x3f9/0x1440 [ 298.720252] ? sock_def_error_report+0x5e0/0x5e0 [ 298.724990] ? perf_trace_lock+0x900/0x900 [ 298.729205] ? trace_hardirqs_off+0x10/0x10 [ 298.733506] ? do_raw_write_unlock+0x290/0x290 [ 298.738068] ? perf_trace_lock+0xd6/0x900 [ 298.742192] ? perf_trace_lock_acquire+0xe3/0x980 [ 298.747016] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 298.752027] ? find_held_lock+0x35/0x1d0 [ 298.756092] ? inet_create+0x3fc/0xf50 [ 298.759960] ? lock_downgrade+0x980/0x980 [ 298.764092] ? lock_release+0xa40/0xa40 [ 298.768043] ? lock_downgrade+0x980/0x980 [ 298.772180] inet_create+0x47c/0xf50 [ 298.775878] ? ipip_gro_receive+0xf0/0xf0 [ 298.780010] ? __lock_is_held+0xb6/0x140 [ 298.784066] __sock_create+0x4d4/0x850 [ 298.787939] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 298.792852] ? user_path_create+0x40/0x40 [ 298.796985] SyS_socket+0xeb/0x1d0 [ 298.800507] ? fillonedir+0x250/0x250 [ 298.804289] ? move_addr_to_kernel+0x60/0x60 [ 298.808683] ? getname_flags+0x256/0x580 [ 298.812728] ? do_syscall_64+0xb7/0x940 [ 298.816682] ? move_addr_to_kernel+0x60/0x60 [ 298.821069] do_syscall_64+0x281/0x940 [ 298.824933] ? vmalloc_sync_all+0x30/0x30 [ 298.829058] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 298.834580] ? syscall_return_slowpath+0x550/0x550 [ 298.839490] ? syscall_return_slowpath+0x2ac/0x550 [ 298.844401] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 298.849745] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.854576] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 298.859743] RIP: 0033:0x4579a7 [ 298.862909] RSP: 002b:00007ffc5c575cf8 EFLAGS: 00000206 ORIG_RAX: 0000000000000029 [ 298.870597] RAX: ffffffffffffffda RBX: 0000000000000209 RCX: 00000000004579a7 [ 298.877845] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 298.885092] RBP: 0000000000048d8d R08: 0000000000000000 R09: 0000000000000001 [ 298.892338] R10: 000000000000000a R11: 0000000000000206 R12: 0000000000000485 [ 298.899584] R13: 000000000000001a R14: 0000000000000485 R15: 0000000000048bdc [ 298.907442] Dumping ftrace buffer: [ 298.911027] (ftrace buffer empty) [ 298.914712] Kernel Offset: disabled [ 298.918325] Rebooting in 86400 seconds..