)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0x0, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:43:59 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:43:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:43:59 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:43:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb4"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:43:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x0, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:43:59 executing program 6 (fault-call:12 fault-nth:1): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:43:59 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001500)=""/133, 0x85}], 0x4, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:43:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb4"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 104.915899] FAULT_INJECTION: forcing a failure. [ 104.915899] name failslab, interval 1, probability 0, space 0, times 0 [ 104.927247] CPU: 1 PID: 16078 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 104.934527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.943883] Call Trace: [ 104.944235] 9pnet_virtio: no channels available for device ./file0/file0 [ 104.946476] dump_stack+0x194/0x24d [ 104.946500] ? arch_local_irq_restore+0x53/0x53 [ 104.946511] ? __save_stack_trace+0x7e/0xd0 2018/03/29 23:43:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 104.946542] should_fail+0x8c0/0xa40 [ 104.955404] 9pnet_virtio: no channels available for device ./file0 [ 104.956970] ? trace_event_raw_event_lock+0x340/0x340 [ 104.956991] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 104.957004] ? kasan_kmalloc+0xad/0xe0 [ 104.957012] ? __kmalloc_track_caller+0x15e/0x760 [ 104.957022] ? memdup_user+0x2c/0x90 [ 104.957029] ? strndup_user+0x62/0xb0 [ 104.957039] ? SyS_mount+0x3c/0x120 [ 104.957059] ? proc_fail_nth_write+0x9b/0x1d0 2018/03/29 23:43:59 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}], 0x4, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 104.985831] 9pnet_virtio: no channels available for device ./file0 [ 104.986266] ? map_files_get_link+0x3a0/0x3a0 [ 104.986290] ? find_held_lock+0x35/0x1d0 [ 104.986350] ? check_same_owner+0x320/0x320 [ 104.986367] ? rcu_note_context_switch+0x710/0x710 [ 104.986379] ? __check_object_size+0x8b/0x530 [ 105.039168] should_failslab+0xec/0x120 [ 105.043148] __kmalloc_track_caller+0x5f/0x760 [ 105.047741] ? strncpy_from_user+0x430/0x430 [ 105.052150] ? strndup_user+0x62/0xb0 [ 105.055947] ? _copy_from_user+0x99/0x110 [ 105.060107] memdup_user+0x2c/0x90 [ 105.063650] strndup_user+0x62/0xb0 [ 105.067284] SyS_mount+0x6b/0x120 [ 105.070734] ? copy_mnt_ns+0xb30/0xb30 [ 105.074619] do_syscall_64+0x281/0x940 [ 105.078486] ? __do_page_fault+0xc90/0xc90 [ 105.082696] ? _raw_spin_unlock_irq+0x27/0x70 [ 105.087167] ? finish_task_switch+0x1c1/0x7e0 [ 105.091642] ? syscall_return_slowpath+0x550/0x550 [ 105.096550] ? syscall_return_slowpath+0x2ac/0x550 [ 105.101458] ? prepare_exit_to_usermode+0x350/0x350 [ 105.106451] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 105.111797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 105.116625] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 105.121792] RIP: 0033:0x4548b9 [ 105.124957] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 105.132641] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 105.139885] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 105.147128] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.154373] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 23:43:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0x0, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:43:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:43:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb4"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 105.161620] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 2018/03/29 23:43:59 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:43:59 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:43:59 executing program 6 (fault-call:12 fault-nth:2): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:43:59 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:43:59 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}], 0x4, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:43:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2b"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:43:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:43:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0x0, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 105.242971] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:43:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 105.304297] FAULT_INJECTION: forcing a failure. [ 105.304297] name failslab, interval 1, probability 0, space 0, times 0 [ 105.315628] CPU: 1 PID: 16126 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 105.322904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.332253] Call Trace: [ 105.334829] dump_stack+0x194/0x24d [ 105.338445] ? arch_local_irq_restore+0x53/0x53 [ 105.343098] ? find_held_lock+0x35/0x1d0 [ 105.347163] should_fail+0x8c0/0xa40 [ 105.350870] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 105.355976] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 105.361153] ? rcutorture_record_progress+0x10/0x10 [ 105.366186] ? find_held_lock+0x35/0x1d0 [ 105.370289] ? check_same_owner+0x320/0x320 [ 105.374597] ? rcu_note_context_switch+0x710/0x710 [ 105.379508] ? save_stack+0xa3/0xd0 [ 105.383126] should_failslab+0xec/0x120 [ 105.387082] kmem_cache_alloc+0x47/0x760 [ 105.391128] ? map_files_get_link+0x3a0/0x3a0 [ 105.395620] getname_flags+0xcb/0x580 [ 105.399416] user_path_at_empty+0x2d/0x50 [ 105.403551] do_mount+0x15f/0x2bb0 [ 105.407070] ? __might_fault+0x110/0x1d0 [ 105.411114] ? lock_downgrade+0x980/0x980 [ 105.415250] ? copy_mount_string+0x40/0x40 [ 105.419464] ? check_same_owner+0x320/0x320 [ 105.423768] ? __check_object_size+0x8b/0x530 [ 105.428261] ? __might_sleep+0x95/0x190 [ 105.432230] ? kasan_check_write+0x14/0x20 [ 105.436442] ? _copy_from_user+0x99/0x110 [ 105.440579] ? memdup_user+0x5e/0x90 [ 105.444271] ? copy_mount_options+0x1f7/0x2e0 [ 105.448757] SyS_mount+0xab/0x120 [ 105.452189] ? copy_mnt_ns+0xb30/0xb30 [ 105.456059] do_syscall_64+0x281/0x940 [ 105.459930] ? __do_page_fault+0xc90/0xc90 [ 105.464143] ? _raw_spin_unlock_irq+0x27/0x70 [ 105.468639] ? finish_task_switch+0x1c1/0x7e0 [ 105.473117] ? syscall_return_slowpath+0x550/0x550 [ 105.478036] ? syscall_return_slowpath+0x2ac/0x550 [ 105.482947] ? prepare_exit_to_usermode+0x350/0x350 [ 105.487947] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 105.493308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 105.498173] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 23:43:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0x0, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:43:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2b"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:43:59 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 105.503355] RIP: 0033:0x4548b9 [ 105.506536] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 105.514242] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 105.521505] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 105.528784] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.536048] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 105.543310] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/29 23:44:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x0, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2b"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:00 executing program 6 (fault-call:12 fault-nth:3): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 105.606665] 9pnet_virtio: no channels available for device ./file0 [ 105.676148] FAULT_INJECTION: forcing a failure. [ 105.676148] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 105.687994] CPU: 1 PID: 16168 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 105.692870] 9pnet_virtio: no channels available for device ./file0/file0 [ 105.695255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.695261] Call Trace: [ 105.695280] dump_stack+0x194/0x24d [ 105.695298] ? arch_local_irq_restore+0x53/0x53 [ 105.695331] should_fail+0x8c0/0xa40 [ 105.695351] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 105.695374] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 105.704203] 9pnet_virtio: no channels available for device ./file0 [ 105.711541] ? trace_event_raw_event_lock+0x340/0x340 [ 105.711570] ? find_held_lock+0x35/0x1d0 [ 105.711587] ? print_irqtrace_events+0x270/0x270 [ 105.756596] ? __is_insn_slot_addr+0x1fc/0x330 [ 105.761163] ? lock_downgrade+0x980/0x980 [ 105.765300] ? perf_trace_lock+0xd6/0x900 [ 105.769459] ? trace_event_raw_event_lock+0x340/0x340 [ 105.774653] ? __lock_acquire+0x664/0x3e00 [ 105.778871] ? should_fail+0x23b/0xa40 [ 105.782745] __alloc_pages_nodemask+0x327/0xdd0 [ 105.787399] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 105.792394] ? rcutorture_record_progress+0x10/0x10 [ 105.797405] ? find_held_lock+0x35/0x1d0 [ 105.801476] ? check_same_owner+0x320/0x320 [ 105.805785] cache_grow_begin+0x72/0x640 [ 105.809831] kmem_cache_alloc+0x400/0x760 [ 105.813960] ? map_files_get_link+0x3a0/0x3a0 [ 105.818442] getname_flags+0xcb/0x580 [ 105.822227] user_path_at_empty+0x2d/0x50 [ 105.826356] do_mount+0x15f/0x2bb0 [ 105.829878] ? __might_fault+0x110/0x1d0 [ 105.833916] ? lock_downgrade+0x980/0x980 [ 105.838043] ? copy_mount_string+0x40/0x40 [ 105.842251] ? check_same_owner+0x320/0x320 [ 105.846548] ? __check_object_size+0x8b/0x530 [ 105.851034] ? __might_sleep+0x95/0x190 [ 105.854994] ? kasan_check_write+0x14/0x20 [ 105.859207] ? _copy_from_user+0x99/0x110 [ 105.863335] ? memdup_user+0x5e/0x90 [ 105.867027] ? copy_mount_options+0x1f7/0x2e0 [ 105.871503] SyS_mount+0xab/0x120 [ 105.874934] ? copy_mnt_ns+0xb30/0xb30 [ 105.878806] do_syscall_64+0x281/0x940 [ 105.882668] ? __do_page_fault+0xc90/0xc90 [ 105.886877] ? _raw_spin_unlock_irq+0x27/0x70 [ 105.891349] ? finish_task_switch+0x1c1/0x7e0 [ 105.895835] ? syscall_return_slowpath+0x550/0x550 [ 105.900742] ? syscall_return_slowpath+0x2ac/0x550 [ 105.905650] ? prepare_exit_to_usermode+0x350/0x350 [ 105.910644] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 105.915991] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 105.920822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 23:44:00 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}], 0x4, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:00 executing program 6 (fault-call:12 fault-nth:4): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x0, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:00 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:00 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x0, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) [ 105.925988] RIP: 0033:0x4548b9 [ 105.929159] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 105.936877] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 105.944120] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 105.951366] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 105.958612] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 105.965858] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 106.048911] FAULT_INJECTION: forcing a failure. [ 106.048911] name failslab, interval 1, probability 0, space 0, times 0 [ 106.060374] CPU: 0 PID: 16186 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 106.064970] 9pnet_virtio: no channels available for device ./file0 [ 106.067650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.067656] Call Trace: [ 106.067675] dump_stack+0x194/0x24d [ 106.067694] ? arch_local_irq_restore+0x53/0x53 [ 106.067726] should_fail+0x8c0/0xa40 [ 106.097894] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 106.102983] ? rcutorture_record_progress+0x10/0x10 [ 106.106798] 9pnet_virtio: no channels available for device ./file0/file0 [ 106.108003] ? is_bpf_text_address+0xa4/0x120 [ 106.108019] ? kernel_text_address+0x102/0x140 [ 106.108043] ? find_held_lock+0x35/0x1d0 [ 106.108091] ? check_same_owner+0x320/0x320 [ 106.116458] 9pnet_virtio: no channels available for device ./file0 [ 106.119365] ? putname+0xee/0x130 [ 106.119373] ? filename_lookup+0x315/0x500 [ 106.119380] ? user_path_at_empty+0x40/0x50 [ 106.119395] ? rcu_note_context_switch+0x710/0x710 [ 106.119406] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 106.119434] should_failslab+0xec/0x120 [ 106.119447] kmem_cache_alloc+0x47/0x760 [ 106.168829] ? perf_trace_lock+0xd6/0x900 [ 106.172962] ? free_obj_work+0x690/0x690 [ 106.177007] alloc_vfsmnt+0xe0/0x9c0 [ 106.180701] ? path_lookupat+0x238/0xba0 [ 106.184741] ? mnt_free_id.isra.21+0x50/0x50 [ 106.189132] ? trace_hardirqs_off+0x10/0x10 [ 106.193434] ? putname+0xee/0x130 [ 106.196867] ? putname+0xee/0x130 [ 106.200295] ? rcu_read_lock_sched_held+0x108/0x120 [ 106.205292] ? find_held_lock+0x35/0x1d0 [ 106.209340] ? __get_fs_type+0x8a/0xc0 [ 106.213205] ? lock_downgrade+0x980/0x980 [ 106.217329] ? module_unload_free+0x5b0/0x5b0 [ 106.221804] ? lock_release+0xa40/0xa40 [ 106.225759] ? mpi_resize+0x200/0x200 [ 106.229544] vfs_kern_mount.part.26+0x84/0x4a0 [ 106.234105] ? may_umount+0xa0/0xa0 [ 106.237707] ? _raw_read_unlock+0x22/0x30 [ 106.241833] ? __get_fs_type+0x8a/0xc0 [ 106.245705] do_mount+0xea4/0x2bb0 [ 106.249222] ? __might_fault+0x110/0x1d0 [ 106.253270] ? copy_mount_string+0x40/0x40 [ 106.257482] ? check_same_owner+0x320/0x320 [ 106.261797] ? __check_object_size+0x8b/0x530 [ 106.266279] ? __might_sleep+0x95/0x190 [ 106.270240] ? kasan_check_write+0x14/0x20 [ 106.274452] ? _copy_from_user+0x99/0x110 [ 106.278580] ? memdup_user+0x5e/0x90 [ 106.282267] ? copy_mount_options+0x1f7/0x2e0 [ 106.286747] SyS_mount+0xab/0x120 [ 106.290173] ? copy_mnt_ns+0xb30/0xb30 [ 106.294040] do_syscall_64+0x281/0x940 [ 106.297902] ? __do_page_fault+0xc90/0xc90 [ 106.302109] ? _raw_spin_unlock_irq+0x27/0x70 [ 106.306580] ? finish_task_switch+0x1c1/0x7e0 [ 106.311053] ? syscall_return_slowpath+0x550/0x550 [ 106.315960] ? syscall_return_slowpath+0x2ac/0x550 [ 106.320865] ? prepare_exit_to_usermode+0x350/0x350 [ 106.325860] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 106.331218] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 106.336054] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 106.341219] RIP: 0033:0x4548b9 [ 106.344382] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 106.352063] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 106.359307] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 106.366552] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 106.373796] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 106.381040] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/29 23:44:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x0, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:00 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x0, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:00 executing program 6 (fault-call:12 fault-nth:5): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:00 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:00 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:00 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 106.469173] FAULT_INJECTION: forcing a failure. [ 106.469173] name failslab, interval 1, probability 0, space 0, times 0 [ 106.480461] CPU: 1 PID: 16212 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 106.487734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.497085] Call Trace: [ 106.499661] dump_stack+0x194/0x24d [ 106.503289] ? arch_local_irq_restore+0x53/0x53 [ 106.507969] should_fail+0x8c0/0xa40 [ 106.510790] 9pnet_virtio: no channels available for device ./file0/file0 [ 106.511682] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 106.511693] ? perf_trace_lock+0xd6/0x900 [ 106.511712] ? save_stack+0xa3/0xd0 [ 106.511730] ? trace_event_raw_event_lock+0x340/0x340 [ 106.511738] ? kasan_slab_alloc+0x12/0x20 [ 106.511749] ? alloc_vfsmnt+0xe0/0x9c0 [ 106.511758] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 106.511766] ? do_mount+0xea4/0x2bb0 [ 106.511782] ? find_held_lock+0x35/0x1d0 [ 106.521342] 9pnet_virtio: no channels available for device ./file0 [ 106.523739] ? check_same_owner+0x320/0x320 2018/03/29 23:44:01 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 106.523759] ? rcu_note_context_switch+0x710/0x710 [ 106.523791] should_failslab+0xec/0x120 [ 106.523804] __kmalloc_track_caller+0x5f/0x760 [ 106.523825] ? do_raw_spin_trylock+0x190/0x190 [ 106.523833] ? kstrdup_const+0x39/0x50 [ 106.523851] kstrdup+0x39/0x70 [ 106.537595] 9pnet_virtio: no channels available for device ./file0 [ 106.540903] kstrdup_const+0x39/0x50 [ 106.540919] alloc_vfsmnt+0x1a5/0x9c0 [ 106.540930] ? path_lookupat+0x238/0xba0 [ 106.610757] ? mnt_free_id.isra.21+0x50/0x50 [ 106.615184] ? trace_hardirqs_off+0x10/0x10 [ 106.619519] ? putname+0xee/0x130 [ 106.622982] ? putname+0xee/0x130 [ 106.626185] 9pnet_virtio: no channels available for device ./file0/file0 [ 106.626433] ? rcu_read_lock_sched_held+0x108/0x120 [ 106.638278] ? find_held_lock+0x35/0x1d0 [ 106.639722] 9pnet_virtio: no channels available for device ./file0 [ 106.642357] ? __get_fs_type+0x8a/0xc0 [ 106.642375] ? lock_downgrade+0x980/0x980 [ 106.642391] ? module_unload_free+0x5b0/0x5b0 [ 106.642405] ? lock_release+0xa40/0xa40 [ 106.642416] ? trace_hardirqs_on_caller+0x421/0x5c0 2018/03/29 23:44:01 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 106.642432] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 106.642457] vfs_kern_mount.part.26+0x84/0x4a0 [ 106.642471] ? may_umount+0xa0/0xa0 [ 106.683153] ? _raw_read_unlock+0x22/0x30 [ 106.687316] ? __get_fs_type+0x8a/0xc0 [ 106.691222] do_mount+0xea4/0x2bb0 [ 106.694763] ? __might_fault+0x110/0x1d0 [ 106.698852] ? copy_mount_string+0x40/0x40 [ 106.703094] ? check_same_owner+0x320/0x320 [ 106.707414] ? __check_object_size+0x8b/0x530 [ 106.711908] ? __might_sleep+0x95/0x190 [ 106.715884] ? kasan_check_write+0x14/0x20 [ 106.720111] ? _copy_from_user+0x99/0x110 [ 106.724264] ? memdup_user+0x5e/0x90 [ 106.726901] 9pnet_virtio: no channels available for device ./file0/file0 [ 106.727978] ? copy_mount_options+0x1f7/0x2e0 [ 106.728000] SyS_mount+0xab/0x120 [ 106.728011] ? copy_mnt_ns+0xb30/0xb30 [ 106.728028] do_syscall_64+0x281/0x940 [ 106.728038] ? __do_page_fault+0xc90/0xc90 [ 106.728047] ? _raw_spin_unlock_irq+0x27/0x70 [ 106.728060] ? finish_task_switch+0x1c1/0x7e0 [ 106.728074] ? syscall_return_slowpath+0x550/0x550 2018/03/29 23:44:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:01 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:01 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x0, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 106.728088] ? syscall_return_slowpath+0x2ac/0x550 [ 106.728102] ? prepare_exit_to_usermode+0x350/0x350 [ 106.728116] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 106.728136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 106.737207] 9pnet_virtio: no channels available for device ./file0 [ 106.739525] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 106.739534] RIP: 0033:0x4548b9 [ 106.739540] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 106.739550] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 2018/03/29 23:44:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:01 executing program 6 (fault-call:12 fault-nth:6): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 106.739555] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 106.739560] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 106.739565] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 106.739571] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 106.857534] 9pnet_virtio: no channels available for device ./file0 [ 106.915766] FAULT_INJECTION: forcing a failure. [ 106.915766] name failslab, interval 1, probability 0, space 0, times 0 [ 106.927342] CPU: 0 PID: 16272 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 106.934610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.943954] Call Trace: [ 106.946529] dump_stack+0x194/0x24d [ 106.950140] ? arch_local_irq_restore+0x53/0x53 [ 106.954808] should_fail+0x8c0/0xa40 [ 106.958505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 106.963587] ? find_next_zero_bit+0xe3/0x110 [ 106.967973] ? trace_hardirqs_off+0x10/0x10 [ 106.972279] ? __lock_is_held+0xb6/0x140 [ 106.976323] ? find_held_lock+0x35/0x1d0 [ 106.980369] ? __lock_is_held+0xb6/0x140 [ 106.984424] ? check_same_owner+0x320/0x320 [ 106.988750] ? rcu_note_context_switch+0x710/0x710 [ 106.993670] ? rcu_note_context_switch+0x710/0x710 [ 106.998589] should_failslab+0xec/0x120 [ 107.002540] __kmalloc+0x63/0x760 [ 107.005977] ? lockdep_init_map+0x9/0x10 [ 107.010018] ? debug_mutex_init+0x2d/0x60 [ 107.014145] ? __list_lru_init+0xcf/0x750 [ 107.018277] __list_lru_init+0xcf/0x750 [ 107.022236] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 107.028098] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 107.033091] ? __lockdep_init_map+0xe4/0x650 [ 107.037481] ? lockdep_init_map+0x9/0x10 [ 107.041523] sget_userns+0x691/0xe40 [ 107.045209] ? set_anon_super+0x20/0x20 [ 107.049165] ? put_filp+0x90/0x90 [ 107.052597] ? destroy_unused_super.part.6+0xd0/0xd0 [ 107.057677] ? alloc_vfsmnt+0x762/0x9c0 [ 107.061624] ? path_lookupat+0x238/0xba0 [ 107.065660] ? mnt_free_id.isra.21+0x50/0x50 [ 107.070049] ? trace_hardirqs_off+0x10/0x10 [ 107.074350] ? putname+0xee/0x130 [ 107.077788] ? cap_capable+0x1b5/0x230 [ 107.081661] ? security_capable+0x8e/0xc0 [ 107.085791] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 107.090969] ? ns_capable_common+0xcf/0x160 [ 107.095272] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 107.100436] mount_ns+0x6d/0x190 [ 107.103788] rpc_mount+0x9e/0xd0 [ 107.107137] mount_fs+0x66/0x2d0 [ 107.110485] vfs_kern_mount.part.26+0xc6/0x4a0 [ 107.115048] ? may_umount+0xa0/0xa0 [ 107.118654] ? _raw_read_unlock+0x22/0x30 [ 107.122778] ? __get_fs_type+0x8a/0xc0 [ 107.126651] do_mount+0xea4/0x2bb0 [ 107.130250] ? __might_fault+0x110/0x1d0 [ 107.134297] ? copy_mount_string+0x40/0x40 [ 107.138507] ? check_same_owner+0x320/0x320 [ 107.142805] ? __check_object_size+0x8b/0x530 [ 107.147288] ? __might_sleep+0x95/0x190 [ 107.151246] ? kasan_check_write+0x14/0x20 [ 107.155455] ? _copy_from_user+0x99/0x110 [ 107.159583] ? memdup_user+0x5e/0x90 [ 107.163270] ? copy_mount_options+0x1f7/0x2e0 [ 107.167749] SyS_mount+0xab/0x120 [ 107.171179] ? copy_mnt_ns+0xb30/0xb30 [ 107.175047] do_syscall_64+0x281/0x940 [ 107.178908] ? __do_page_fault+0xc90/0xc90 [ 107.183117] ? _raw_spin_unlock_irq+0x27/0x70 [ 107.187587] ? finish_task_switch+0x1c1/0x7e0 [ 107.192059] ? syscall_return_slowpath+0x550/0x550 [ 107.196967] ? syscall_return_slowpath+0x2ac/0x550 [ 107.201872] ? prepare_exit_to_usermode+0x350/0x350 [ 107.206867] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 107.212215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.217047] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 107.222211] RIP: 0033:0x4548b9 [ 107.225374] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 107.233056] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 107.240310] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 107.247556] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 107.254799] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 23:44:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 107.262043] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/29 23:44:01 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:01 executing program 6 (fault-call:12 fault-nth:7): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x0, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:01 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:01 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:01 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 107.362133] 9pnet_virtio: no channels available for device ./file0/file0 [ 107.367041] FAULT_INJECTION: forcing a failure. [ 107.367041] name failslab, interval 1, probability 0, space 0, times 0 [ 107.380310] CPU: 0 PID: 16296 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 107.387433] 9pnet_virtio: no channels available for device ./file0 [ 107.387583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.403225] Call Trace: [ 107.405814] dump_stack+0x194/0x24d 2018/03/29 23:44:01 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:01 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 107.409448] ? arch_local_irq_restore+0x53/0x53 [ 107.414150] should_fail+0x8c0/0xa40 [ 107.417876] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 107.422990] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 107.427768] ? retint_kernel+0x10/0x10 [ 107.431669] ? find_held_lock+0x35/0x1d0 [ 107.435753] ? __lock_is_held+0xb6/0x140 [ 107.439844] ? check_same_owner+0x320/0x320 [ 107.444166] ? rcu_note_context_switch+0x710/0x710 [ 107.449096] ? rcu_note_context_switch+0x710/0x710 [ 107.454043] should_failslab+0xec/0x120 [ 107.458018] __kmalloc+0x63/0x760 2018/03/29 23:44:01 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) [ 107.461917] ? lockdep_init_map+0x9/0x10 [ 107.465982] ? debug_mutex_init+0x2d/0x60 [ 107.470126] ? __list_lru_init+0xcf/0x750 [ 107.472611] 9pnet_virtio: no channels available for device ./file0 [ 107.474281] __list_lru_init+0xcf/0x750 [ 107.474306] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 107.474325] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 107.474341] ? __lockdep_init_map+0xe4/0x650 [ 107.474359] ? lockdep_init_map+0x9/0x10 [ 107.503924] sget_userns+0x691/0xe40 [ 107.507640] ? set_anon_super+0x20/0x20 2018/03/29 23:44:01 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 107.509538] 9pnet_virtio: no channels available for device ./file0/file0 [ 107.511624] ? put_filp+0x90/0x90 [ 107.511640] ? destroy_unused_super.part.6+0xd0/0xd0 [ 107.511651] ? alloc_vfsmnt+0x762/0x9c0 [ 107.520394] 9pnet_virtio: no channels available for device ./file0 [ 107.521915] ? path_lookupat+0x238/0xba0 [ 107.521930] ? mnt_free_id.isra.21+0x50/0x50 [ 107.521953] ? trace_hardirqs_off+0x10/0x10 [ 107.521970] ? putname+0xee/0x130 [ 107.521990] ? cap_capable+0x1b5/0x230 [ 107.522015] ? security_capable+0x8e/0xc0 [ 107.522033] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 107.522041] ? ns_capable_common+0xcf/0x160 [ 107.522057] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 107.576290] mount_ns+0x6d/0x190 [ 107.579645] rpc_mount+0x9e/0xd0 [ 107.582995] mount_fs+0x66/0x2d0 [ 107.586351] vfs_kern_mount.part.26+0xc6/0x4a0 [ 107.590915] ? may_umount+0xa0/0xa0 [ 107.594519] ? _raw_read_unlock+0x22/0x30 [ 107.598641] ? __get_fs_type+0x8a/0xc0 [ 107.602517] do_mount+0xea4/0x2bb0 [ 107.606036] ? __might_fault+0x110/0x1d0 [ 107.610083] ? copy_mount_string+0x40/0x40 [ 107.614295] ? check_same_owner+0x320/0x320 [ 107.618595] ? __check_object_size+0x8b/0x530 [ 107.623077] ? __might_sleep+0x95/0x190 [ 107.627043] ? kasan_check_write+0x14/0x20 [ 107.631253] ? _copy_from_user+0x99/0x110 [ 107.635385] ? memdup_user+0x5e/0x90 [ 107.639073] ? copy_mount_options+0x1f7/0x2e0 [ 107.643552] SyS_mount+0xab/0x120 [ 107.646978] ? copy_mnt_ns+0xb30/0xb30 [ 107.650846] do_syscall_64+0x281/0x940 [ 107.654715] ? __do_page_fault+0xc90/0xc90 [ 107.658923] ? _raw_spin_unlock_irq+0x27/0x70 [ 107.663395] ? finish_task_switch+0x1c1/0x7e0 [ 107.667867] ? syscall_return_slowpath+0x550/0x550 [ 107.672773] ? syscall_return_slowpath+0x2ac/0x550 [ 107.677680] ? prepare_exit_to_usermode+0x350/0x350 [ 107.682677] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 107.688031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 107.692859] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 107.698029] RIP: 0033:0x4548b9 [ 107.701195] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 23:44:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 107.708877] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 107.716122] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 107.723368] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 107.730609] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 107.737852] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 2018/03/29 23:44:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:02 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:02 executing program 6 (fault-call:12 fault-nth:8): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:02 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:02 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 107.819792] 9pnet_virtio: no channels available for device ./file0/file0 [ 107.828597] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:02 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 107.898658] FAULT_INJECTION: forcing a failure. [ 107.898658] name failslab, interval 1, probability 0, space 0, times 0 [ 107.910149] CPU: 0 PID: 16356 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 107.917434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.926781] Call Trace: [ 107.929361] dump_stack+0x194/0x24d [ 107.932998] ? arch_local_irq_restore+0x53/0x53 [ 107.937669] ? kernel_text_address+0x102/0x140 [ 107.938163] 9pnet_virtio: no channels available for device ./file0/file0 [ 107.942365] should_fail+0x8c0/0xa40 [ 107.942386] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 107.942418] ? save_stack+0x43/0xd0 [ 107.942426] ? kasan_kmalloc+0xad/0xe0 [ 107.942433] ? __kmalloc+0x162/0x760 [ 107.942444] ? __list_lru_init+0xcf/0x750 [ 107.942465] ? find_held_lock+0x35/0x1d0 [ 107.942485] ? __lock_is_held+0xb6/0x140 [ 107.953241] 9pnet_virtio: no channels available for device ./file0 [ 107.958119] ? check_same_owner+0x320/0x320 [ 107.958140] ? rcu_note_context_switch+0x710/0x710 2018/03/29 23:44:02 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 107.958172] should_failslab+0xec/0x120 [ 107.958186] kmem_cache_alloc_node_trace+0x5a/0x760 [ 107.958199] ? mark_held_locks+0xaf/0x100 [ 107.996549] 9pnet_virtio: no channels available for device ./file0 [ 107.997051] ? __raw_spin_lock_init+0x1c/0x100 [ 107.997081] __kmalloc_node+0x33/0x70 [ 107.997100] kvmalloc_node+0x99/0xd0 [ 107.997118] __list_lru_init+0x5d5/0x750 [ 107.997138] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 108.038456] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 108.043482] ? __lockdep_init_map+0xe4/0x650 [ 108.047902] ? lockdep_init_map+0x9/0x10 [ 108.051958] sget_userns+0x691/0xe40 [ 108.055662] ? set_anon_super+0x20/0x20 [ 108.059636] ? put_filp+0x90/0x90 [ 108.063078] ? destroy_unused_super.part.6+0xd0/0xd0 [ 108.068158] ? alloc_vfsmnt+0x762/0x9c0 [ 108.072120] ? path_lookupat+0x238/0xba0 [ 108.076173] ? mnt_free_id.isra.21+0x50/0x50 [ 108.076434] 9pnet_virtio: no channels available for device ./file0/file0 [ 108.080585] ? trace_hardirqs_off+0x10/0x10 [ 108.080604] ? putname+0xee/0x130 [ 108.080625] ? cap_capable+0x1b5/0x230 [ 108.080651] ? security_capable+0x8e/0xc0 [ 108.080668] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 108.080681] ? ns_capable_common+0xcf/0x160 [ 108.089595] 9pnet_virtio: no channels available for device ./file0 [ 108.091812] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 108.091823] mount_ns+0x6d/0x190 [ 108.091846] rpc_mount+0x9e/0xd0 [ 108.091864] mount_fs+0x66/0x2d0 [ 108.091888] vfs_kern_mount.part.26+0xc6/0x4a0 [ 108.091903] ? may_umount+0xa0/0xa0 [ 108.091916] ? _raw_read_unlock+0x22/0x30 [ 108.146529] ? __get_fs_type+0x8a/0xc0 [ 108.150412] do_mount+0xea4/0x2bb0 [ 108.153937] ? __might_fault+0x110/0x1d0 [ 108.158002] ? copy_mount_string+0x40/0x40 [ 108.162235] ? check_same_owner+0x320/0x320 [ 108.166558] ? __check_object_size+0x8b/0x530 [ 108.171056] ? __might_sleep+0x95/0x190 [ 108.175031] ? kasan_check_write+0x14/0x20 [ 108.179258] ? _copy_from_user+0x99/0x110 [ 108.183404] ? memdup_user+0x5e/0x90 [ 108.187100] ? copy_mount_options+0x1f7/0x2e0 [ 108.191578] SyS_mount+0xab/0x120 [ 108.195008] ? copy_mnt_ns+0xb30/0xb30 [ 108.198889] do_syscall_64+0x281/0x940 [ 108.203111] ? __do_page_fault+0xc90/0xc90 [ 108.207326] ? _raw_spin_unlock_irq+0x27/0x70 [ 108.211816] ? finish_task_switch+0x1c1/0x7e0 [ 108.216309] ? syscall_return_slowpath+0x550/0x550 [ 108.221223] ? syscall_return_slowpath+0x2ac/0x550 [ 108.226136] ? prepare_exit_to_usermode+0x350/0x350 [ 108.231138] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 108.236485] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 108.241310] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 108.246473] RIP: 0033:0x4548b9 [ 108.249638] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 108.257324] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 108.264568] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 108.271820] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 108.279075] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 108.286325] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/29 23:44:02 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:02 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:02 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:02 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b81437"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:02 executing program 6 (fault-call:12 fault-nth:9): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0x50, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b81437"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 108.403507] FAULT_INJECTION: forcing a failure. [ 108.403507] name failslab, interval 1, probability 0, space 0, times 0 [ 108.414824] CPU: 1 PID: 16414 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 108.422099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.423963] 9pnet_virtio: no channels available for device ./file0 [ 108.431445] Call Trace: [ 108.431467] dump_stack+0x194/0x24d [ 108.431487] ? arch_local_irq_restore+0x53/0x53 [ 108.431523] should_fail+0x8c0/0xa40 2018/03/29 23:44:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0x50, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) [ 108.431542] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 108.442182] 9pnet_virtio: no channels available for device ./file0/file0 [ 108.444036] ? __kernel_text_address+0xd/0x40 [ 108.444050] ? unwind_get_return_address+0x61/0xa0 [ 108.444090] ? find_held_lock+0x35/0x1d0 [ 108.455329] 9pnet_virtio: no channels available for device ./file0 [ 108.457531] ? __lock_is_held+0xb6/0x140 [ 108.457574] ? check_same_owner+0x320/0x320 [ 108.457593] ? rcu_note_context_switch+0x710/0x710 [ 108.457621] should_failslab+0xec/0x120 [ 108.501400] kmem_cache_alloc_trace+0x4b/0x740 [ 108.505986] ? __kmalloc_node+0x33/0x70 [ 108.509962] ? __kmalloc_node+0x33/0x70 [ 108.513937] ? rcu_read_lock_sched_held+0x108/0x120 [ 108.518971] __memcg_init_list_lru_node+0x169/0x270 [ 108.524004] ? list_lru_add+0x7c0/0x7c0 [ 108.527994] ? __kmalloc_node+0x47/0x70 [ 108.531988] __list_lru_init+0x544/0x750 [ 108.536060] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 108.541946] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 108.546968] ? __lockdep_init_map+0xe4/0x650 [ 108.551377] ? lockdep_init_map+0x9/0x10 [ 108.555425] sget_userns+0x691/0xe40 [ 108.559114] ? set_anon_super+0x20/0x20 [ 108.563077] ? put_filp+0x90/0x90 [ 108.566507] ? destroy_unused_super.part.6+0xd0/0xd0 [ 108.571586] ? alloc_vfsmnt+0x762/0x9c0 [ 108.575534] ? path_lookupat+0x238/0xba0 [ 108.579572] ? mnt_free_id.isra.21+0x50/0x50 [ 108.583964] ? trace_hardirqs_off+0x10/0x10 [ 108.588271] ? mark_held_locks+0xaf/0x100 [ 108.592394] ? cap_capable+0x1b5/0x230 [ 108.596267] ? security_capable+0x8e/0xc0 [ 108.600395] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 108.605559] ? ns_capable_common+0xcf/0x160 [ 108.609860] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 108.615035] mount_ns+0x6d/0x190 [ 108.618387] rpc_mount+0x9e/0xd0 [ 108.621734] mount_fs+0x66/0x2d0 [ 108.625083] vfs_kern_mount.part.26+0xc6/0x4a0 [ 108.629646] ? may_umount+0xa0/0xa0 [ 108.633253] ? _raw_read_unlock+0x22/0x30 [ 108.637378] ? __get_fs_type+0x8a/0xc0 [ 108.641252] do_mount+0xea4/0x2bb0 [ 108.644769] ? __might_fault+0x110/0x1d0 [ 108.648817] ? copy_mount_string+0x40/0x40 [ 108.653032] ? check_same_owner+0x320/0x320 [ 108.657332] ? __check_object_size+0x8b/0x530 [ 108.661814] ? __might_sleep+0x95/0x190 [ 108.665774] ? kasan_check_write+0x14/0x20 [ 108.669985] ? _copy_from_user+0x99/0x110 [ 108.674115] ? memdup_user+0x5e/0x90 [ 108.677810] ? copy_mount_options+0x1f7/0x2e0 [ 108.682291] SyS_mount+0xab/0x120 [ 108.685724] ? copy_mnt_ns+0xb30/0xb30 [ 108.689596] do_syscall_64+0x281/0x940 [ 108.693457] ? __do_page_fault+0xc90/0xc90 [ 108.697669] ? _raw_spin_unlock_irq+0x27/0x70 [ 108.702141] ? finish_task_switch+0x1c1/0x7e0 [ 108.706614] ? syscall_return_slowpath+0x550/0x550 [ 108.711522] ? syscall_return_slowpath+0x2ac/0x550 [ 108.716430] ? prepare_exit_to_usermode+0x350/0x350 [ 108.721425] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 108.726772] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 108.731601] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 108.736767] RIP: 0033:0x4548b9 [ 108.739951] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 108.747635] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 2018/03/29 23:44:03 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b81437"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:03 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0x50, &(0x7f0000000500)}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) [ 108.754882] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 108.762135] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 108.769380] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 108.776625] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 2018/03/29 23:44:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:03 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:03 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:03 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:03 executing program 6 (fault-call:12 fault-nth:10): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 108.859054] 9pnet_virtio: no channels available for device ./file0/file0 [ 108.872988] 9pnet_virtio: no channels available for device ./file0 [ 108.890391] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 108.960997] FAULT_INJECTION: forcing a failure. [ 108.960997] name failslab, interval 1, probability 0, space 0, times 0 [ 108.972320] CPU: 0 PID: 16458 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 108.979588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.988928] Call Trace: [ 108.991502] dump_stack+0x194/0x24d [ 108.995114] ? arch_local_irq_restore+0x53/0x53 [ 108.999764] ? __save_stack_trace+0x7e/0xd0 [ 109.004078] should_fail+0x8c0/0xa40 [ 109.007774] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 109.012857] ? kasan_kmalloc+0xad/0xe0 [ 109.016717] ? kmem_cache_alloc_trace+0x136/0x740 [ 109.021535] ? __memcg_init_list_lru_node+0x169/0x270 [ 109.026700] ? __list_lru_init+0x544/0x750 [ 109.030908] ? sget_userns+0x691/0xe40 [ 109.034776] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 109.039506] ? do_mount+0xea4/0x2bb0 [ 109.043191] ? SyS_mount+0xab/0x120 [ 109.046791] ? do_syscall_64+0x281/0x940 [ 109.050825] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 109.056174] ? find_held_lock+0x35/0x1d0 [ 109.060218] ? __lock_is_held+0xb6/0x140 [ 109.064276] ? check_same_owner+0x320/0x320 [ 109.068579] ? rcu_note_context_switch+0x710/0x710 [ 109.073498] should_failslab+0xec/0x120 [ 109.077448] kmem_cache_alloc_trace+0x4b/0x740 [ 109.082006] ? __kmalloc_node+0x33/0x70 [ 109.085962] ? __kmalloc_node+0x33/0x70 [ 109.089912] ? rcu_read_lock_sched_held+0x108/0x120 [ 109.094911] __memcg_init_list_lru_node+0x169/0x270 [ 109.099911] ? list_lru_add+0x7c0/0x7c0 [ 109.103863] ? __kmalloc_node+0x47/0x70 [ 109.107825] __list_lru_init+0x544/0x750 [ 109.111873] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 109.117736] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 109.122731] ? __lockdep_init_map+0xe4/0x650 [ 109.127120] ? lockdep_init_map+0x9/0x10 [ 109.131161] sget_userns+0x691/0xe40 [ 109.134848] ? set_anon_super+0x20/0x20 [ 109.138810] ? put_filp+0x90/0x90 [ 109.142242] ? destroy_unused_super.part.6+0xd0/0xd0 [ 109.147329] ? alloc_vfsmnt+0x762/0x9c0 [ 109.151278] ? path_lookupat+0x238/0xba0 [ 109.155315] ? mnt_free_id.isra.21+0x50/0x50 [ 109.159708] ? trace_hardirqs_off+0x10/0x10 [ 109.164013] ? putname+0xee/0x130 [ 109.167455] ? cap_capable+0x1b5/0x230 [ 109.171326] ? security_capable+0x8e/0xc0 [ 109.175456] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 109.180627] ? ns_capable_common+0xcf/0x160 [ 109.185021] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 109.190190] mount_ns+0x6d/0x190 [ 109.193544] rpc_mount+0x9e/0xd0 [ 109.196892] mount_fs+0x66/0x2d0 [ 109.200240] vfs_kern_mount.part.26+0xc6/0x4a0 [ 109.204802] ? may_umount+0xa0/0xa0 [ 109.208406] ? _raw_read_unlock+0x22/0x30 [ 109.212547] ? __get_fs_type+0x8a/0xc0 [ 109.216526] do_mount+0xea4/0x2bb0 [ 109.220061] ? __might_fault+0x110/0x1d0 [ 109.224131] ? copy_mount_string+0x40/0x40 [ 109.228359] ? check_same_owner+0x320/0x320 [ 109.232681] ? __check_object_size+0x8b/0x530 [ 109.237181] ? __might_sleep+0x95/0x190 [ 109.241161] ? kasan_check_write+0x14/0x20 [ 109.245391] ? _copy_from_user+0x99/0x110 [ 109.249543] ? memdup_user+0x5e/0x90 [ 109.253263] ? copy_mount_options+0x1f7/0x2e0 [ 109.257759] SyS_mount+0xab/0x120 [ 109.261208] ? copy_mnt_ns+0xb30/0xb30 [ 109.265093] do_syscall_64+0x281/0x940 [ 109.268975] ? __do_page_fault+0xc90/0xc90 [ 109.273203] ? _raw_spin_unlock_irq+0x27/0x70 [ 109.277696] ? finish_task_switch+0x1c1/0x7e0 [ 109.282193] ? syscall_return_slowpath+0x550/0x550 [ 109.287125] ? syscall_return_slowpath+0x2ac/0x550 [ 109.292052] ? prepare_exit_to_usermode+0x350/0x350 [ 109.297055] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 109.302405] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 109.307235] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 23:44:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 109.312399] RIP: 0033:0x4548b9 [ 109.315563] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 109.323252] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 109.330499] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 109.337744] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 109.344990] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 109.352236] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/29 23:44:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:03 executing program 6 (fault-call:12 fault-nth:11): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:03 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 109.408816] 9pnet_virtio: no channels available for device ./file0 [ 109.435347] 9pnet_virtio: no channels available for device ./file0/file0 2018/03/29 23:44:03 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 109.455206] 9pnet_virtio: no channels available for device ./file0 [ 109.472389] FAULT_INJECTION: forcing a failure. [ 109.472389] name failslab, interval 1, probability 0, space 0, times 0 [ 109.483727] CPU: 0 PID: 16491 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 109.491001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.500354] Call Trace: [ 109.502952] dump_stack+0x194/0x24d 2018/03/29 23:44:03 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 109.506616] ? arch_local_irq_restore+0x53/0x53 [ 109.511288] ? __save_stack_trace+0x7e/0xd0 [ 109.515634] should_fail+0x8c0/0xa40 [ 109.519361] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 109.524468] ? kasan_kmalloc+0xad/0xe0 [ 109.528352] ? kmem_cache_alloc_trace+0x136/0x740 [ 109.533194] ? __memcg_init_list_lru_node+0x169/0x270 [ 109.538641] ? __list_lru_init+0x544/0x750 [ 109.542871] ? sget_userns+0x691/0xe40 [ 109.546758] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 109.551508] ? do_mount+0xea4/0x2bb0 [ 109.555216] ? SyS_mount+0xab/0x120 [ 109.558841] ? do_syscall_64+0x281/0x940 [ 109.562896] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 109.568268] ? find_held_lock+0x35/0x1d0 [ 109.572344] ? __lock_is_held+0xb6/0x140 [ 109.576425] ? check_same_owner+0x320/0x320 [ 109.580748] ? rcu_note_context_switch+0x710/0x710 [ 109.585701] should_failslab+0xec/0x120 [ 109.589675] kmem_cache_alloc_trace+0x4b/0x740 [ 109.594268] ? __kmalloc_node+0x33/0x70 [ 109.598238] ? __kmalloc_node+0x33/0x70 [ 109.602212] ? rcu_read_lock_sched_held+0x108/0x120 [ 109.607240] __memcg_init_list_lru_node+0x169/0x270 [ 109.612266] ? list_lru_add+0x7c0/0x7c0 [ 109.616238] ? __kmalloc_node+0x47/0x70 [ 109.620228] __list_lru_init+0x544/0x750 [ 109.624290] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 109.630156] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 109.635149] ? __lockdep_init_map+0xe4/0x650 [ 109.639545] ? lockdep_init_map+0x9/0x10 [ 109.643588] sget_userns+0x691/0xe40 [ 109.647277] ? set_anon_super+0x20/0x20 [ 109.651238] ? put_filp+0x90/0x90 [ 109.654670] ? destroy_unused_super.part.6+0xd0/0xd0 [ 109.659748] ? alloc_vfsmnt+0x762/0x9c0 [ 109.663697] ? path_lookupat+0x238/0xba0 [ 109.667734] ? mnt_free_id.isra.21+0x50/0x50 [ 109.672125] ? trace_hardirqs_off+0x10/0x10 [ 109.676426] ? putname+0xee/0x130 [ 109.679859] ? cap_capable+0x1b5/0x230 [ 109.683733] ? security_capable+0x8e/0xc0 [ 109.687863] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 109.693034] ? ns_capable_common+0xcf/0x160 [ 109.697338] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 109.702500] mount_ns+0x6d/0x190 [ 109.705859] rpc_mount+0x9e/0xd0 [ 109.709206] mount_fs+0x66/0x2d0 [ 109.712555] vfs_kern_mount.part.26+0xc6/0x4a0 [ 109.717124] ? may_umount+0xa0/0xa0 [ 109.720729] ? _raw_read_unlock+0x22/0x30 [ 109.724854] ? __get_fs_type+0x8a/0xc0 [ 109.728728] do_mount+0xea4/0x2bb0 [ 109.732243] ? __might_fault+0x110/0x1d0 [ 109.736289] ? copy_mount_string+0x40/0x40 [ 109.740498] ? check_same_owner+0x320/0x320 [ 109.744796] ? __check_object_size+0x8b/0x530 [ 109.749277] ? __might_sleep+0x95/0x190 [ 109.753237] ? kasan_check_write+0x14/0x20 [ 109.757447] ? _copy_from_user+0x99/0x110 [ 109.761575] ? memdup_user+0x5e/0x90 [ 109.765266] ? copy_mount_options+0x1f7/0x2e0 [ 109.769742] SyS_mount+0xab/0x120 [ 109.773170] ? copy_mnt_ns+0xb30/0xb30 [ 109.777043] do_syscall_64+0x281/0x940 [ 109.780907] ? __do_page_fault+0xc90/0xc90 [ 109.785113] ? _raw_spin_unlock_irq+0x27/0x70 [ 109.789583] ? finish_task_switch+0x1c1/0x7e0 [ 109.794056] ? syscall_return_slowpath+0x550/0x550 [ 109.798961] ? syscall_return_slowpath+0x2ac/0x550 [ 109.803868] ? prepare_exit_to_usermode+0x350/0x350 [ 109.808861] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 109.814209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 109.819042] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 109.824207] RIP: 0033:0x4548b9 [ 109.827371] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 109.835054] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 109.842298] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 109.849544] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 23:44:04 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5deb", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:04 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:04 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 109.856787] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 109.864033] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/29 23:44:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:04 executing program 6 (fault-call:12 fault-nth:12): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:04 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:04 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5deb", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:04 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:04 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 109.939630] 9pnet_virtio: no channels available for device ./file0 [ 109.955736] 9pnet_virtio: no channels available for device ./file0/file0 [ 109.963482] 9pnet_virtio: no channels available for device ./file0 [ 110.029961] FAULT_INJECTION: forcing a failure. [ 110.029961] name failslab, interval 1, probability 0, space 0, times 0 [ 110.041320] CPU: 1 PID: 16544 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 110.048579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.057907] Call Trace: [ 110.060479] dump_stack+0x194/0x24d [ 110.064089] ? arch_local_irq_restore+0x53/0x53 [ 110.068844] ? __save_stack_trace+0x7e/0xd0 [ 110.073158] should_fail+0x8c0/0xa40 [ 110.076857] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 110.081936] ? kasan_kmalloc+0xad/0xe0 [ 110.085799] ? kmem_cache_alloc_trace+0x136/0x740 [ 110.090616] ? __memcg_init_list_lru_node+0x169/0x270 [ 110.095781] ? __list_lru_init+0x544/0x750 [ 110.099990] ? sget_userns+0x691/0xe40 [ 110.103866] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 110.108598] ? do_mount+0xea4/0x2bb0 [ 110.112284] ? SyS_mount+0xab/0x120 [ 110.115887] ? do_syscall_64+0x281/0x940 [ 110.119921] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 110.125269] ? find_held_lock+0x35/0x1d0 [ 110.129315] ? __lock_is_held+0xb6/0x140 [ 110.133373] ? check_same_owner+0x320/0x320 [ 110.137674] ? rcu_note_context_switch+0x710/0x710 [ 110.142590] should_failslab+0xec/0x120 [ 110.146543] kmem_cache_alloc_trace+0x4b/0x740 [ 110.151100] ? __kmalloc_node+0x33/0x70 [ 110.155048] ? __kmalloc_node+0x33/0x70 [ 110.159002] ? rcu_read_lock_sched_held+0x108/0x120 [ 110.164017] __memcg_init_list_lru_node+0x169/0x270 [ 110.169028] ? list_lru_add+0x7c0/0x7c0 [ 110.172984] ? __kmalloc_node+0x47/0x70 [ 110.176951] __list_lru_init+0x544/0x750 [ 110.180998] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 110.186865] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 110.191861] ? __lockdep_init_map+0xe4/0x650 [ 110.196250] ? lockdep_init_map+0x9/0x10 [ 110.200293] sget_userns+0x691/0xe40 [ 110.204070] ? set_anon_super+0x20/0x20 [ 110.208036] ? put_filp+0x90/0x90 [ 110.211468] ? destroy_unused_super.part.6+0xd0/0xd0 [ 110.216545] ? alloc_vfsmnt+0x762/0x9c0 [ 110.220492] ? path_lookupat+0x238/0xba0 [ 110.224529] ? mnt_free_id.isra.21+0x50/0x50 [ 110.228921] ? trace_hardirqs_off+0x10/0x10 [ 110.233223] ? putname+0xee/0x130 [ 110.236658] ? cap_capable+0x1b5/0x230 [ 110.240533] ? security_capable+0x8e/0xc0 [ 110.244661] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 110.249824] ? ns_capable_common+0xcf/0x160 [ 110.254129] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 110.259294] mount_ns+0x6d/0x190 [ 110.262643] rpc_mount+0x9e/0xd0 [ 110.265994] mount_fs+0x66/0x2d0 [ 110.269346] vfs_kern_mount.part.26+0xc6/0x4a0 [ 110.273922] ? may_umount+0xa0/0xa0 [ 110.277525] ? _raw_read_unlock+0x22/0x30 [ 110.281649] ? __get_fs_type+0x8a/0xc0 [ 110.285520] do_mount+0xea4/0x2bb0 [ 110.289035] ? __might_fault+0x110/0x1d0 [ 110.293084] ? copy_mount_string+0x40/0x40 [ 110.297294] ? check_same_owner+0x320/0x320 [ 110.301594] ? __check_object_size+0x8b/0x530 [ 110.306076] ? __might_sleep+0x95/0x190 [ 110.310041] ? kasan_check_write+0x14/0x20 [ 110.314251] ? _copy_from_user+0x99/0x110 [ 110.318379] ? memdup_user+0x5e/0x90 [ 110.322067] ? copy_mount_options+0x1f7/0x2e0 [ 110.326547] SyS_mount+0xab/0x120 [ 110.330604] ? copy_mnt_ns+0xb30/0xb30 [ 110.334475] do_syscall_64+0x281/0x940 [ 110.338338] ? __do_page_fault+0xc90/0xc90 [ 110.342545] ? _raw_spin_unlock_irq+0x27/0x70 [ 110.347036] ? finish_task_switch+0x1c1/0x7e0 [ 110.351510] ? syscall_return_slowpath+0x550/0x550 [ 110.356417] ? syscall_return_slowpath+0x2ac/0x550 [ 110.361323] ? prepare_exit_to_usermode+0x350/0x350 [ 110.366316] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 110.371664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 110.376494] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 23:44:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:04 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 110.381658] RIP: 0033:0x4548b9 [ 110.384843] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 110.392526] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 110.399769] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 110.407017] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 110.414439] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 110.421682] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/29 23:44:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:04 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:04 executing program 6 (fault-call:12 fault-nth:13): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:04 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) [ 110.486228] 9pnet_virtio: no channels available for device ./file0/file0 [ 110.520655] 9pnet_virtio: no channels available for device ./file0 [ 110.574537] FAULT_INJECTION: forcing a failure. [ 110.574537] name failslab, interval 1, probability 0, space 0, times 0 [ 110.585682] 9pnet_virtio: no channels available for device ./file0 [ 110.585863] CPU: 0 PID: 16573 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 110.599377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.608733] Call Trace: [ 110.611332] dump_stack+0x194/0x24d [ 110.614976] ? arch_local_irq_restore+0x53/0x53 [ 110.619658] ? __save_stack_trace+0x7e/0xd0 [ 110.624052] should_fail+0x8c0/0xa40 [ 110.627777] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 110.633155] ? kasan_kmalloc+0xad/0xe0 [ 110.637035] ? kmem_cache_alloc_trace+0x136/0x740 [ 110.641877] ? __memcg_init_list_lru_node+0x169/0x270 [ 110.647327] ? __list_lru_init+0x544/0x750 [ 110.651638] ? sget_userns+0x691/0xe40 [ 110.655589] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 110.660343] ? do_mount+0xea4/0x2bb0 [ 110.664065] ? SyS_mount+0xab/0x120 [ 110.667687] ? do_syscall_64+0x281/0x940 [ 110.671742] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 110.677123] ? find_held_lock+0x35/0x1d0 [ 110.681188] ? __lock_is_held+0xb6/0x140 [ 110.685268] ? check_same_owner+0x320/0x320 [ 110.689588] ? rcu_note_context_switch+0x710/0x710 [ 110.694513] should_failslab+0xec/0x120 [ 110.698474] kmem_cache_alloc_trace+0x4b/0x740 [ 110.703038] ? __kmalloc_node+0x33/0x70 [ 110.707005] __memcg_init_list_lru_node+0x169/0x270 [ 110.712013] ? list_lru_add+0x7c0/0x7c0 [ 110.715969] ? __kmalloc_node+0x47/0x70 [ 110.719929] __list_lru_init+0x544/0x750 [ 110.723983] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 110.729850] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 110.734847] ? __lockdep_init_map+0xe4/0x650 [ 110.739247] ? lockdep_init_map+0x9/0x10 [ 110.743290] sget_userns+0x691/0xe40 [ 110.746980] ? set_anon_super+0x20/0x20 [ 110.750938] ? put_filp+0x90/0x90 [ 110.754372] ? destroy_unused_super.part.6+0xd0/0xd0 [ 110.759454] ? alloc_vfsmnt+0x762/0x9c0 [ 110.763403] ? path_lookupat+0x238/0xba0 [ 110.767443] ? mnt_free_id.isra.21+0x50/0x50 [ 110.771836] ? trace_hardirqs_off+0x10/0x10 [ 110.776136] ? putname+0xee/0x130 [ 110.779575] ? cap_capable+0x1b5/0x230 [ 110.783452] ? security_capable+0x8e/0xc0 [ 110.787581] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 110.792754] ? ns_capable_common+0xcf/0x160 [ 110.797067] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 110.802229] mount_ns+0x6d/0x190 [ 110.805579] rpc_mount+0x9e/0xd0 [ 110.808925] mount_fs+0x66/0x2d0 [ 110.812277] vfs_kern_mount.part.26+0xc6/0x4a0 [ 110.816838] ? may_umount+0xa0/0xa0 [ 110.820450] ? _raw_read_unlock+0x22/0x30 [ 110.824574] ? __get_fs_type+0x8a/0xc0 [ 110.828453] do_mount+0xea4/0x2bb0 [ 110.831970] ? __might_fault+0x110/0x1d0 [ 110.836025] ? copy_mount_string+0x40/0x40 [ 110.840237] ? check_same_owner+0x320/0x320 [ 110.844537] ? __check_object_size+0x8b/0x530 [ 110.849026] ? __might_sleep+0x95/0x190 [ 110.852986] ? kasan_check_write+0x14/0x20 [ 110.857198] ? _copy_from_user+0x99/0x110 [ 110.861328] ? memdup_user+0x5e/0x90 [ 110.865021] ? copy_mount_options+0x1f7/0x2e0 [ 110.869504] SyS_mount+0xab/0x120 [ 110.872935] ? copy_mnt_ns+0xb30/0xb30 [ 110.876801] do_syscall_64+0x281/0x940 [ 110.880662] ? __do_page_fault+0xc90/0xc90 [ 110.884871] ? _raw_spin_unlock_irq+0x27/0x70 [ 110.889342] ? finish_task_switch+0x1c1/0x7e0 [ 110.893816] ? syscall_return_slowpath+0x550/0x550 [ 110.898720] ? syscall_return_slowpath+0x2ac/0x550 [ 110.903627] ? prepare_exit_to_usermode+0x350/0x350 [ 110.908795] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 110.914142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 110.918980] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 23:44:05 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:05 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r1, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r1, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r2, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r3 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r1, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5deb", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:05 executing program 6 (fault-call:12 fault-nth:14): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 110.924145] RIP: 0033:0x4548b9 [ 110.927309] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 110.934991] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 110.942236] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 110.949480] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 110.956725] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 110.963969] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d 2018/03/29 23:44:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0), &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 111.041152] FAULT_INJECTION: forcing a failure. [ 111.041152] name failslab, interval 1, probability 0, space 0, times 0 [ 111.052623] CPU: 0 PID: 16593 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 111.059898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.061195] 9pnet_virtio: no channels available for device ./file0/file0 [ 111.069243] Call Trace: [ 111.069264] dump_stack+0x194/0x24d [ 111.069284] ? arch_local_irq_restore+0x53/0x53 [ 111.069296] ? __save_stack_trace+0x7e/0xd0 2018/03/29 23:44:05 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e6", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 111.069325] should_fail+0x8c0/0xa40 [ 111.088301] 9pnet_virtio: no channels available for device ./file0 [ 111.091291] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 111.091306] ? kasan_kmalloc+0xad/0xe0 [ 111.091314] ? kmem_cache_alloc_trace+0x136/0x740 [ 111.091326] ? __memcg_init_list_lru_node+0x169/0x270 [ 111.091334] ? __list_lru_init+0x544/0x750 [ 111.091342] ? sget_userns+0x691/0xe40 [ 111.091357] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 111.091364] ? do_mount+0xea4/0x2bb0 [ 111.091374] ? SyS_mount+0xab/0x120 [ 111.140725] ? do_syscall_64+0x281/0x940 [ 111.144791] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 111.150167] ? find_held_lock+0x35/0x1d0 [ 111.151651] 9pnet_virtio: no channels available for device ./file0 [ 111.154236] ? __lock_is_held+0xb6/0x140 [ 111.154275] ? check_same_owner+0x320/0x320 [ 111.168942] ? rcu_note_context_switch+0x710/0x710 [ 111.173893] should_failslab+0xec/0x120 [ 111.177873] kmem_cache_alloc_trace+0x4b/0x740 [ 111.182460] ? __kmalloc_node+0x33/0x70 [ 111.186442] ? __kmalloc_node+0x33/0x70 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 111.190425] ? rcu_read_lock_sched_held+0x108/0x120 [ 111.195456] __memcg_init_list_lru_node+0x169/0x270 [ 111.200482] ? list_lru_add+0x7c0/0x7c0 [ 111.204206] 9pnet_virtio: no channels available for device ./file0/file0 [ 111.204451] ? __kmalloc_node+0x47/0x70 [ 111.215249] __list_lru_init+0x544/0x750 [ 111.216486] 9pnet_virtio: no channels available for device ./file0 [ 111.219315] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 111.219335] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 111.219350] ? __lockdep_init_map+0xe4/0x650 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:05 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 111.219368] ? lockdep_init_map+0x9/0x10 [ 111.219387] sget_userns+0x691/0xe40 [ 111.219397] ? set_anon_super+0x20/0x20 [ 111.219420] ? put_filp+0x90/0x90 [ 111.256096] ? destroy_unused_super.part.6+0xd0/0xd0 [ 111.261201] ? alloc_vfsmnt+0x762/0x9c0 [ 111.265172] ? path_lookupat+0x238/0xba0 [ 111.269239] ? mnt_free_id.isra.21+0x50/0x50 [ 111.273656] ? trace_hardirqs_off+0x10/0x10 [ 111.277982] ? putname+0xee/0x130 [ 111.281528] ? cap_capable+0x1b5/0x230 [ 111.285435] ? security_capable+0x8e/0xc0 [ 111.289587] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 111.294775] ? ns_capable_common+0xcf/0x160 [ 111.299104] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 111.304292] mount_ns+0x6d/0x190 [ 111.307667] rpc_mount+0x9e/0xd0 [ 111.311039] mount_fs+0x66/0x2d0 [ 111.314419] vfs_kern_mount.part.26+0xc6/0x4a0 [ 111.319006] ? may_umount+0xa0/0xa0 [ 111.322633] ? _raw_read_unlock+0x22/0x30 [ 111.326771] ? __get_fs_type+0x8a/0xc0 [ 111.330645] do_mount+0xea4/0x2bb0 [ 111.334163] ? __might_fault+0x110/0x1d0 [ 111.338212] ? copy_mount_string+0x40/0x40 [ 111.342426] ? check_same_owner+0x320/0x320 [ 111.346723] ? __check_object_size+0x8b/0x530 [ 111.351204] ? __might_sleep+0x95/0x190 [ 111.355166] ? kasan_check_write+0x14/0x20 [ 111.359377] ? _copy_from_user+0x99/0x110 [ 111.363510] ? memdup_user+0x5e/0x90 [ 111.367199] ? copy_mount_options+0x1f7/0x2e0 [ 111.371678] SyS_mount+0xab/0x120 [ 111.375106] ? copy_mnt_ns+0xb30/0xb30 [ 111.378976] do_syscall_64+0x281/0x940 [ 111.382841] ? __do_page_fault+0xc90/0xc90 [ 111.387048] ? _raw_spin_unlock_irq+0x27/0x70 [ 111.391521] ? finish_task_switch+0x1c1/0x7e0 [ 111.395992] ? syscall_return_slowpath+0x550/0x550 [ 111.400902] ? syscall_return_slowpath+0x2ac/0x550 [ 111.405809] ? prepare_exit_to_usermode+0x350/0x350 [ 111.410801] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 111.416155] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 111.420983] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 111.426146] RIP: 0033:0x4548b9 [ 111.429320] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0), &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e6", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 111.437005] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 111.444257] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 111.451503] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 111.458750] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 111.465993] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/29 23:44:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:05 executing program 6 (fault-call:12 fault-nth:15): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0), &(0x7f0000000380)=""/73}, 0x18) [ 111.551500] 9pnet_virtio: no channels available for device ./file0 [ 111.592269] 9pnet_virtio: no channels available for device ./file0/file0 [ 111.600224] 9pnet_virtio: no channels available for device ./file0 [ 111.614134] FAULT_INJECTION: forcing a failure. [ 111.614134] name failslab, interval 1, probability 0, space 0, times 0 [ 111.625458] CPU: 1 PID: 16666 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 111.632729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.642081] Call Trace: [ 111.644677] dump_stack+0x194/0x24d [ 111.648314] ? arch_local_irq_restore+0x53/0x53 [ 111.652972] ? __save_stack_trace+0x7e/0xd0 [ 111.657290] should_fail+0x8c0/0xa40 [ 111.660988] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 111.666075] ? kasan_kmalloc+0xad/0xe0 [ 111.669936] ? kmem_cache_alloc_trace+0x136/0x740 [ 111.674842] ? __memcg_init_list_lru_node+0x169/0x270 [ 111.680012] ? __list_lru_init+0x544/0x750 [ 111.684223] ? sget_userns+0x691/0xe40 [ 111.688092] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 111.692819] ? do_mount+0xea4/0x2bb0 [ 111.696505] ? SyS_mount+0xab/0x120 [ 111.700105] ? do_syscall_64+0x281/0x940 [ 111.704143] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 111.709495] ? find_held_lock+0x35/0x1d0 [ 111.713539] ? __lock_is_held+0xb6/0x140 [ 111.717595] ? check_same_owner+0x320/0x320 [ 111.721897] ? rcu_note_context_switch+0x710/0x710 [ 111.726815] should_failslab+0xec/0x120 [ 111.730766] kmem_cache_alloc_trace+0x4b/0x740 [ 111.735325] ? __kmalloc_node+0x33/0x70 [ 111.739274] ? __kmalloc_node+0x33/0x70 [ 111.743226] ? rcu_read_lock_sched_held+0x108/0x120 [ 111.748226] __memcg_init_list_lru_node+0x169/0x270 [ 111.753330] ? list_lru_add+0x7c0/0x7c0 [ 111.757367] ? __kmalloc_node+0x47/0x70 [ 111.761328] __list_lru_init+0x544/0x750 [ 111.765376] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 111.771239] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 111.776235] ? __lockdep_init_map+0xe4/0x650 [ 111.780624] ? lockdep_init_map+0x9/0x10 [ 111.784669] sget_userns+0x691/0xe40 [ 111.788359] ? set_anon_super+0x20/0x20 [ 111.792319] ? put_filp+0x90/0x90 [ 111.795750] ? destroy_unused_super.part.6+0xd0/0xd0 [ 111.800831] ? alloc_vfsmnt+0x762/0x9c0 [ 111.804800] ? path_lookupat+0x238/0xba0 [ 111.808838] ? mnt_free_id.isra.21+0x50/0x50 [ 111.813234] ? trace_hardirqs_off+0x10/0x10 [ 111.817535] ? putname+0xee/0x130 [ 111.820977] ? cap_capable+0x1b5/0x230 [ 111.824857] ? security_capable+0x8e/0xc0 [ 111.828986] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 111.834177] ? ns_capable_common+0xcf/0x160 [ 111.838482] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 111.843645] mount_ns+0x6d/0x190 [ 111.846998] rpc_mount+0x9e/0xd0 [ 111.850351] mount_fs+0x66/0x2d0 [ 111.853700] vfs_kern_mount.part.26+0xc6/0x4a0 [ 111.858262] ? may_umount+0xa0/0xa0 [ 111.861868] ? _raw_read_unlock+0x22/0x30 [ 111.865992] ? __get_fs_type+0x8a/0xc0 [ 111.869874] do_mount+0xea4/0x2bb0 [ 111.873389] ? __might_fault+0x110/0x1d0 [ 111.877440] ? copy_mount_string+0x40/0x40 [ 111.881655] ? check_same_owner+0x320/0x320 [ 111.885958] ? __check_object_size+0x8b/0x530 [ 111.890442] ? __might_sleep+0x95/0x190 [ 111.894409] ? kasan_check_write+0x14/0x20 [ 111.898624] ? _copy_from_user+0x99/0x110 [ 111.902759] ? memdup_user+0x5e/0x90 [ 111.906449] ? copy_mount_options+0x1f7/0x2e0 [ 111.910929] SyS_mount+0xab/0x120 [ 111.914365] ? copy_mnt_ns+0xb30/0xb30 [ 111.918236] do_syscall_64+0x281/0x940 [ 111.922099] ? __do_page_fault+0xc90/0xc90 [ 111.926311] ? _raw_spin_unlock_irq+0x27/0x70 [ 111.930784] ? finish_task_switch+0x1c1/0x7e0 [ 111.935258] ? syscall_return_slowpath+0x550/0x550 [ 111.940166] ? syscall_return_slowpath+0x2ac/0x550 [ 111.945083] ? prepare_exit_to_usermode+0x350/0x350 [ 111.950079] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 111.955426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 111.960253] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 111.965416] RIP: 0033:0x4548b9 [ 111.968583] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 111.976266] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 111.983513] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 2018/03/29 23:44:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:06 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:06 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:06 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e6", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:06 executing program 6 (fault-call:12 fault-nth:16): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:06 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 111.990767] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 111.998030] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 112.005293] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/29 23:44:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 112.095624] FAULT_INJECTION: forcing a failure. [ 112.095624] name failslab, interval 1, probability 0, space 0, times 0 [ 112.095628] 9pnet_virtio: no channels available for device ./file0/file0 [ 112.096363] 9pnet_virtio: no channels available for device ./file0 [ 112.106967] CPU: 1 PID: 16687 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 112.127354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.136701] Call Trace: [ 112.139294] dump_stack+0x194/0x24d [ 112.142934] ? arch_local_irq_restore+0x53/0x53 [ 112.147602] ? __save_stack_trace+0x7e/0xd0 [ 112.151935] should_fail+0x8c0/0xa40 [ 112.155652] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 112.160755] ? kasan_kmalloc+0xad/0xe0 [ 112.164637] ? kmem_cache_alloc_trace+0x136/0x740 [ 112.169470] ? __memcg_init_list_lru_node+0x169/0x270 [ 112.173959] 9pnet_virtio: no channels available for device ./file0 [ 112.174651] ? __list_lru_init+0x544/0x750 [ 112.174661] ? sget_userns+0x691/0xe40 [ 112.174679] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 112.174687] ? do_mount+0xea4/0x2bb0 [ 112.174696] ? SyS_mount+0xab/0x120 [ 112.174705] ? do_syscall_64+0x281/0x940 [ 112.174715] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 112.174739] ? find_held_lock+0x35/0x1d0 [ 112.174759] ? __lock_is_held+0xb6/0x140 [ 112.218664] ? check_same_owner+0x320/0x320 [ 112.222970] ? rcu_note_context_switch+0x710/0x710 [ 112.227889] should_failslab+0xec/0x120 [ 112.231841] kmem_cache_alloc_trace+0x4b/0x740 [ 112.236401] ? __kmalloc_node+0x33/0x70 [ 112.240350] ? __kmalloc_node+0x33/0x70 [ 112.244303] ? rcu_read_lock_sched_held+0x108/0x120 [ 112.249308] __memcg_init_list_lru_node+0x169/0x270 [ 112.254311] ? list_lru_add+0x7c0/0x7c0 [ 112.258266] ? __kmalloc_node+0x47/0x70 [ 112.262227] __list_lru_init+0x544/0x750 [ 112.266271] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 112.272135] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 112.277132] ? __lockdep_init_map+0xe4/0x650 [ 112.281521] ? lockdep_init_map+0x9/0x10 [ 112.285562] sget_userns+0x691/0xe40 [ 112.289253] ? set_anon_super+0x20/0x20 [ 112.293213] ? put_filp+0x90/0x90 [ 112.296647] ? destroy_unused_super.part.6+0xd0/0xd0 [ 112.301728] ? alloc_vfsmnt+0x762/0x9c0 [ 112.305676] ? path_lookupat+0x238/0xba0 [ 112.309713] ? mnt_free_id.isra.21+0x50/0x50 [ 112.314105] ? trace_hardirqs_off+0x10/0x10 [ 112.318405] ? putname+0xee/0x130 [ 112.321842] ? cap_capable+0x1b5/0x230 [ 112.325714] ? security_capable+0x8e/0xc0 [ 112.330596] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 112.335766] ? ns_capable_common+0xcf/0x160 [ 112.340078] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 112.345245] mount_ns+0x6d/0x190 [ 112.348595] rpc_mount+0x9e/0xd0 [ 112.351942] mount_fs+0x66/0x2d0 [ 112.355294] vfs_kern_mount.part.26+0xc6/0x4a0 [ 112.359858] ? may_umount+0xa0/0xa0 [ 112.363461] ? _raw_read_unlock+0x22/0x30 [ 112.367585] ? __get_fs_type+0x8a/0xc0 [ 112.371459] do_mount+0xea4/0x2bb0 [ 112.374975] ? __might_fault+0x110/0x1d0 [ 112.379034] ? copy_mount_string+0x40/0x40 [ 112.383247] ? check_same_owner+0x320/0x320 [ 112.387544] ? __check_object_size+0x8b/0x530 [ 112.392036] ? __might_sleep+0x95/0x190 [ 112.396000] ? kasan_check_write+0x14/0x20 [ 112.400216] ? _copy_from_user+0x99/0x110 [ 112.404345] ? memdup_user+0x5e/0x90 [ 112.408039] ? copy_mount_options+0x1f7/0x2e0 [ 112.412519] SyS_mount+0xab/0x120 [ 112.415951] ? copy_mnt_ns+0xb30/0xb30 [ 112.419823] do_syscall_64+0x281/0x940 [ 112.423691] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 112.429207] ? syscall_return_slowpath+0x550/0x550 [ 112.434124] ? syscall_return_slowpath+0x2ac/0x550 [ 112.439048] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 112.444393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 112.449222] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 112.454387] RIP: 0033:0x4548b9 [ 112.457550] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 112.465236] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 112.472480] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 112.479725] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 112.486969] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 112.494214] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/29 23:44:06 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x0, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:06 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10d", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:06 executing program 6 (fault-call:12 fault-nth:17): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:06 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:06 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:06 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c850", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 112.579834] FAULT_INJECTION: forcing a failure. [ 112.579834] name failslab, interval 1, probability 0, space 0, times 0 [ 112.591204] CPU: 0 PID: 16722 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 112.598479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.607836] Call Trace: [ 112.608488] 9pnet_virtio: no channels available for device ./file0 [ 112.610429] dump_stack+0x194/0x24d [ 112.610452] ? arch_local_irq_restore+0x53/0x53 [ 112.610465] ? __save_stack_trace+0x7e/0xd0 2018/03/29 23:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 112.610496] should_fail+0x8c0/0xa40 [ 112.633071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 112.638177] ? kasan_kmalloc+0xad/0xe0 [ 112.642057] ? kmem_cache_alloc_trace+0x136/0x740 [ 112.646894] ? __memcg_init_list_lru_node+0x169/0x270 [ 112.652082] ? __list_lru_init+0x544/0x750 [ 112.656313] ? sget_userns+0x691/0xe40 [ 112.660203] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 112.664962] ? do_mount+0xea4/0x2bb0 [ 112.666763] 9pnet_virtio: no channels available for device ./file0/file0 [ 112.668667] ? SyS_mount+0xab/0x120 2018/03/29 23:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:07 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 112.668679] ? do_syscall_64+0x281/0x940 [ 112.668688] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 112.668712] ? find_held_lock+0x35/0x1d0 [ 112.668731] ? __lock_is_held+0xb6/0x140 [ 112.696666] ? check_same_owner+0x320/0x320 [ 112.700997] ? rcu_note_context_switch+0x710/0x710 [ 112.705946] should_failslab+0xec/0x120 [ 112.709925] kmem_cache_alloc_trace+0x4b/0x740 [ 112.714508] ? __kmalloc_node+0x33/0x70 [ 112.716950] 9pnet_virtio: no channels available for device ./file0 [ 112.718477] ? __kmalloc_node+0x33/0x70 [ 112.718493] ? rcu_read_lock_sched_held+0x108/0x120 [ 112.718519] __memcg_init_list_lru_node+0x169/0x270 [ 112.718540] ? list_lru_add+0x7c0/0x7c0 [ 112.718553] ? __kmalloc_node+0x47/0x70 [ 112.718581] __list_lru_init+0x544/0x750 [ 112.750801] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 112.756695] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 112.761719] ? __lockdep_init_map+0xe4/0x650 [ 112.766134] ? lockdep_init_map+0x9/0x10 [ 112.770205] sget_userns+0x691/0xe40 [ 112.773920] ? set_anon_super+0x20/0x20 [ 112.777904] ? put_filp+0x90/0x90 [ 112.781363] ? destroy_unused_super.part.6+0xd0/0xd0 [ 112.786472] ? alloc_vfsmnt+0x762/0x9c0 [ 112.790444] ? path_lookupat+0x238/0xba0 [ 112.792978] 9pnet_virtio: no channels available for device ./file0 [ 112.794498] ? mnt_free_id.isra.21+0x50/0x50 [ 112.794521] ? trace_hardirqs_off+0x10/0x10 [ 112.794543] ? putname+0xee/0x130 [ 112.812992] ? cap_capable+0x1b5/0x230 [ 112.816896] ? security_capable+0x8e/0xc0 [ 112.821050] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 112.826342] ? ns_capable_common+0xcf/0x160 [ 112.830663] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 112.835844] mount_ns+0x6d/0x190 [ 112.839206] rpc_mount+0x9e/0xd0 [ 112.842554] mount_fs+0x66/0x2d0 [ 112.845907] vfs_kern_mount.part.26+0xc6/0x4a0 [ 112.850467] ? may_umount+0xa0/0xa0 [ 112.854072] ? _raw_read_unlock+0x22/0x30 [ 112.858198] ? __get_fs_type+0x8a/0xc0 [ 112.862069] do_mount+0xea4/0x2bb0 [ 112.865586] ? __might_fault+0x110/0x1d0 [ 112.869632] ? copy_mount_string+0x40/0x40 [ 112.873844] ? check_same_owner+0x320/0x320 [ 112.878140] ? __check_object_size+0x8b/0x530 [ 112.882624] ? __might_sleep+0x95/0x190 [ 112.886584] ? kasan_check_write+0x14/0x20 [ 112.890798] ? _copy_from_user+0x99/0x110 [ 112.894927] ? memdup_user+0x5e/0x90 [ 112.898616] ? copy_mount_options+0x1f7/0x2e0 [ 112.903093] SyS_mount+0xab/0x120 [ 112.906523] ? copy_mnt_ns+0xb30/0xb30 [ 112.910390] do_syscall_64+0x281/0x940 [ 112.914251] ? __do_page_fault+0xc90/0xc90 [ 112.918461] ? _raw_spin_unlock_irq+0x27/0x70 [ 112.922931] ? finish_task_switch+0x1c1/0x7e0 [ 112.927402] ? syscall_return_slowpath+0x550/0x550 [ 112.932312] ? syscall_return_slowpath+0x2ac/0x550 [ 112.937227] ? prepare_exit_to_usermode+0x350/0x350 [ 112.942224] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 112.947572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 112.952406] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 112.957572] RIP: 0033:0x4548b9 [ 112.960738] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 112.968420] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 2018/03/29 23:44:07 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:07 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c850", &(0x7f0000000380)=""/73}, 0x18) [ 112.975663] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 112.982910] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 112.990154] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 112.997428] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 113.082923] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:07 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:07 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:07 executing program 6 (fault-call:12 fault-nth:18): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:07 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10d", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c850", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:07 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:07 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:07 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 113.172297] FAULT_INJECTION: forcing a failure. [ 113.172297] name failslab, interval 1, probability 0, space 0, times 0 [ 113.183593] CPU: 1 PID: 16790 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 113.190865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.200215] Call Trace: [ 113.202793] dump_stack+0x194/0x24d [ 113.206406] ? arch_local_irq_restore+0x53/0x53 [ 113.211058] ? __save_stack_trace+0x7e/0xd0 [ 113.215374] should_fail+0x8c0/0xa40 [ 113.219075] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 113.224155] ? kasan_kmalloc+0xad/0xe0 [ 113.228025] ? kmem_cache_alloc_trace+0x136/0x740 [ 113.232846] ? __memcg_init_list_lru_node+0x169/0x270 [ 113.238015] ? __list_lru_init+0x544/0x750 [ 113.242229] ? sget_userns+0x691/0xe40 [ 113.246143] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 113.250877] ? do_mount+0xea4/0x2bb0 [ 113.254565] ? SyS_mount+0xab/0x120 [ 113.258167] ? do_syscall_64+0x281/0x940 [ 113.262205] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 113.267553] ? find_held_lock+0x35/0x1d0 [ 113.271601] ? __lock_is_held+0xb6/0x140 [ 113.275657] ? check_same_owner+0x320/0x320 [ 113.279961] ? rcu_note_context_switch+0x710/0x710 [ 113.284880] should_failslab+0xec/0x120 [ 113.288835] kmem_cache_alloc_trace+0x4b/0x740 [ 113.293395] ? __kmalloc_node+0x33/0x70 [ 113.297345] ? __kmalloc_node+0x33/0x70 [ 113.301299] ? rcu_read_lock_sched_held+0x108/0x120 [ 113.306299] __memcg_init_list_lru_node+0x169/0x270 [ 113.311298] ? list_lru_add+0x7c0/0x7c0 [ 113.315250] ? __kmalloc_node+0x47/0x70 [ 113.319211] __list_lru_init+0x544/0x750 [ 113.323258] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 113.329123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 113.334117] ? __lockdep_init_map+0xe4/0x650 [ 113.338517] ? lockdep_init_map+0x9/0x10 [ 113.342560] sget_userns+0x691/0xe40 [ 113.346249] ? set_anon_super+0x20/0x20 [ 113.350207] ? put_filp+0x90/0x90 [ 113.353639] ? destroy_unused_super.part.6+0xd0/0xd0 [ 113.358722] ? alloc_vfsmnt+0x762/0x9c0 [ 113.362672] ? path_lookupat+0x238/0xba0 [ 113.366711] ? mnt_free_id.isra.21+0x50/0x50 [ 113.371104] ? trace_hardirqs_off+0x10/0x10 [ 113.375413] ? putname+0xee/0x130 [ 113.378865] ? cap_capable+0x1b5/0x230 [ 113.382761] ? security_capable+0x8e/0xc0 [ 113.386907] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 113.392092] ? ns_capable_common+0xcf/0x160 [ 113.396415] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 113.401600] mount_ns+0x6d/0x190 [ 113.404964] rpc_mount+0x9e/0xd0 [ 113.408333] mount_fs+0x66/0x2d0 [ 113.411703] vfs_kern_mount.part.26+0xc6/0x4a0 [ 113.416294] ? may_umount+0xa0/0xa0 [ 113.419913] ? _raw_read_unlock+0x22/0x30 [ 113.424060] ? __get_fs_type+0x8a/0xc0 [ 113.427956] do_mount+0xea4/0x2bb0 [ 113.431485] ? __might_fault+0x110/0x1d0 [ 113.435555] ? copy_mount_string+0x40/0x40 [ 113.439786] ? check_same_owner+0x320/0x320 [ 113.444105] ? __check_object_size+0x8b/0x530 [ 113.448608] ? __might_sleep+0x95/0x190 [ 113.452583] ? kasan_check_write+0x14/0x20 [ 113.456796] ? _copy_from_user+0x99/0x110 [ 113.460930] ? memdup_user+0x5e/0x90 [ 113.464624] ? copy_mount_options+0x1f7/0x2e0 [ 113.469103] SyS_mount+0xab/0x120 [ 113.472535] ? copy_mnt_ns+0xb30/0xb30 [ 113.476404] do_syscall_64+0x281/0x940 [ 113.480267] ? __do_page_fault+0xc90/0xc90 [ 113.484488] ? _raw_spin_unlock_irq+0x27/0x70 [ 113.488962] ? finish_task_switch+0x1c1/0x7e0 [ 113.493439] ? syscall_return_slowpath+0x550/0x550 [ 113.498348] ? syscall_return_slowpath+0x2ac/0x550 [ 113.503256] ? prepare_exit_to_usermode+0x350/0x350 [ 113.508251] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 113.513598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 113.518428] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 113.523590] RIP: 0033:0x4548b9 [ 113.526754] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 113.534441] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 113.541694] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 113.548948] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 113.556191] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 113.563437] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 [ 113.608057] 9pnet_virtio: no channels available for device ./file0 [ 113.614823] 9pnet_virtio: no channels available for device ./file0/file0 [ 113.624880] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:08 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5deb", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:08 executing program 6 (fault-call:12 fault-nth:19): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:08 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10d", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:08 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xc, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77", &(0x7f0000000380)=""/73}, 0x18) [ 113.705223] FAULT_INJECTION: forcing a failure. [ 113.705223] name failslab, interval 1, probability 0, space 0, times 0 [ 113.716534] CPU: 1 PID: 16820 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 113.723801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.733136] Call Trace: [ 113.735882] dump_stack+0x194/0x24d [ 113.739495] ? arch_local_irq_restore+0x53/0x53 [ 113.744159] should_fail+0x8c0/0xa40 [ 113.748115] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 113.753194] ? trace_event_raw_event_lock+0x340/0x340 [ 113.758362] ? trace_hardirqs_off+0x10/0x10 [ 113.762663] ? lock_downgrade+0x980/0x980 [ 113.766795] ? trace_hardirqs_off+0x10/0x10 [ 113.771098] ? find_held_lock+0x35/0x1d0 [ 113.775145] ? __lock_is_held+0xb6/0x140 [ 113.779203] ? check_same_owner+0x320/0x320 [ 113.783504] ? rcu_note_context_switch+0x710/0x710 [ 113.788412] ? rcu_note_context_switch+0x710/0x710 [ 113.793332] should_failslab+0xec/0x120 [ 113.797282] __kmalloc+0x63/0x760 [ 113.800715] ? __kmalloc_node+0x47/0x70 [ 113.804668] ? __list_lru_init+0xcf/0x750 [ 113.808806] __list_lru_init+0xcf/0x750 [ 113.812766] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 113.818629] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 113.823631] ? lockdep_init_map+0x9/0x10 [ 113.827672] sget_userns+0x6b1/0xe40 [ 113.831363] ? set_anon_super+0x20/0x20 [ 113.835321] ? put_filp+0x90/0x90 [ 113.838751] ? destroy_unused_super.part.6+0xd0/0xd0 [ 113.843828] ? alloc_vfsmnt+0x762/0x9c0 [ 113.847779] ? path_lookupat+0x238/0xba0 [ 113.851817] ? mnt_free_id.isra.21+0x50/0x50 [ 113.856209] ? trace_hardirqs_off+0x10/0x10 [ 113.860509] ? putname+0xee/0x130 [ 113.863946] ? cap_capable+0x1b5/0x230 [ 113.867819] ? security_capable+0x8e/0xc0 [ 113.871950] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 113.877113] ? ns_capable_common+0xcf/0x160 [ 113.881416] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 113.886579] mount_ns+0x6d/0x190 [ 113.890023] rpc_mount+0x9e/0xd0 [ 113.893374] mount_fs+0x66/0x2d0 [ 113.896725] vfs_kern_mount.part.26+0xc6/0x4a0 [ 113.901460] ? may_umount+0xa0/0xa0 [ 113.905064] ? _raw_read_unlock+0x22/0x30 [ 113.909188] ? __get_fs_type+0x8a/0xc0 [ 113.913061] do_mount+0xea4/0x2bb0 [ 113.916572] ? __might_fault+0x110/0x1d0 [ 113.920624] ? copy_mount_string+0x40/0x40 [ 113.924834] ? check_same_owner+0x320/0x320 [ 113.929132] ? __check_object_size+0x8b/0x530 [ 113.933614] ? __might_sleep+0x95/0x190 [ 113.937574] ? kasan_check_write+0x14/0x20 [ 113.941784] ? _copy_from_user+0x99/0x110 [ 113.945911] ? memdup_user+0x5e/0x90 [ 113.949598] ? copy_mount_options+0x1f7/0x2e0 [ 113.954075] SyS_mount+0xab/0x120 [ 113.957505] ? copy_mnt_ns+0xb30/0xb30 [ 113.961371] do_syscall_64+0x281/0x940 [ 113.965233] ? __do_page_fault+0xc90/0xc90 [ 113.969440] ? _raw_spin_unlock_irq+0x27/0x70 [ 113.973912] ? finish_task_switch+0x1c1/0x7e0 [ 113.978473] ? syscall_return_slowpath+0x550/0x550 [ 113.983387] ? syscall_return_slowpath+0x2ac/0x550 [ 113.988305] ? prepare_exit_to_usermode+0x350/0x350 [ 113.993298] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 113.998644] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 23:44:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 114.003474] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 114.008637] RIP: 0033:0x4548b9 [ 114.011802] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.019488] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 114.026730] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 114.033977] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 114.041221] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 114.048463] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/29 23:44:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77", &(0x7f0000000380)=""/73}, 0x18) [ 114.104214] 9pnet_virtio: no channels available for device ./file0/file0 [ 114.111451] 9pnet_virtio: no channels available for device ./file0 [ 114.119219] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:08 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:08 executing program 6 (fault-call:12 fault-nth:20): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:08 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:08 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:08 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:08 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:08 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5deb", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 114.244763] FAULT_INJECTION: forcing a failure. [ 114.244763] name failslab, interval 1, probability 0, space 0, times 0 [ 114.256116] CPU: 1 PID: 16861 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 114.263389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.272727] Call Trace: [ 114.275295] dump_stack+0x194/0x24d [ 114.278905] ? arch_local_irq_restore+0x53/0x53 [ 114.283557] ? kernel_text_address+0x102/0x140 [ 114.288131] should_fail+0x8c0/0xa40 [ 114.291827] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 114.296919] ? save_stack+0x43/0xd0 [ 114.300518] ? kasan_kmalloc+0xad/0xe0 [ 114.304378] ? __kmalloc+0x162/0x760 [ 114.308067] ? __list_lru_init+0xcf/0x750 [ 114.312196] ? find_held_lock+0x35/0x1d0 [ 114.316243] ? __lock_is_held+0xb6/0x140 [ 114.320300] ? check_same_owner+0x320/0x320 [ 114.324604] ? rcu_note_context_switch+0x710/0x710 [ 114.330230] should_failslab+0xec/0x120 [ 114.334187] kmem_cache_alloc_node_trace+0x5a/0x760 [ 114.339181] ? mark_held_locks+0xaf/0x100 [ 114.343308] ? __raw_spin_lock_init+0x1c/0x100 [ 114.347875] __kmalloc_node+0x33/0x70 [ 114.351656] kvmalloc_node+0x99/0xd0 [ 114.355351] __list_lru_init+0x5d5/0x750 [ 114.359398] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 114.365263] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 114.370265] ? lockdep_init_map+0x9/0x10 [ 114.374309] sget_userns+0x6b1/0xe40 [ 114.377999] ? set_anon_super+0x20/0x20 [ 114.381962] ? put_filp+0x90/0x90 [ 114.385400] ? destroy_unused_super.part.6+0xd0/0xd0 [ 114.390479] ? alloc_vfsmnt+0x762/0x9c0 [ 114.394429] ? path_lookupat+0x238/0xba0 [ 114.398467] ? mnt_free_id.isra.21+0x50/0x50 [ 114.402858] ? trace_hardirqs_off+0x10/0x10 [ 114.407162] ? putname+0xee/0x130 [ 114.410598] ? cap_capable+0x1b5/0x230 [ 114.414469] ? security_capable+0x8e/0xc0 [ 114.418597] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 114.423760] ? ns_capable_common+0xcf/0x160 [ 114.428065] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 114.433228] mount_ns+0x6d/0x190 [ 114.436618] rpc_mount+0x9e/0xd0 [ 114.440229] mount_fs+0x66/0x2d0 [ 114.443581] vfs_kern_mount.part.26+0xc6/0x4a0 [ 114.448144] ? may_umount+0xa0/0xa0 [ 114.451750] ? _raw_read_unlock+0x22/0x30 [ 114.455872] ? __get_fs_type+0x8a/0xc0 [ 114.459745] do_mount+0xea4/0x2bb0 [ 114.463259] ? __might_fault+0x110/0x1d0 [ 114.467308] ? copy_mount_string+0x40/0x40 [ 114.471526] ? check_same_owner+0x320/0x320 [ 114.475822] ? __check_object_size+0x8b/0x530 [ 114.480303] ? __might_sleep+0x95/0x190 [ 114.484270] ? kasan_check_write+0x14/0x20 [ 114.488481] ? _copy_from_user+0x99/0x110 [ 114.492622] ? memdup_user+0x5e/0x90 [ 114.496327] ? copy_mount_options+0x1f7/0x2e0 [ 114.500810] SyS_mount+0xab/0x120 [ 114.504240] ? copy_mnt_ns+0xb30/0xb30 [ 114.508111] do_syscall_64+0x281/0x940 [ 114.511975] ? __do_page_fault+0xc90/0xc90 [ 114.516187] ? _raw_spin_unlock_irq+0x27/0x70 [ 114.520657] ? finish_task_switch+0x1c1/0x7e0 [ 114.525129] ? syscall_return_slowpath+0x550/0x550 [ 114.530040] ? syscall_return_slowpath+0x2ac/0x550 [ 114.534947] ? prepare_exit_to_usermode+0x350/0x350 [ 114.539942] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 114.545287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 114.550114] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 114.555277] RIP: 0033:0x4548b9 [ 114.558444] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.566129] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 114.573375] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 114.580621] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 114.587864] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 23:44:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:09 executing program 6 (fault-call:12 fault-nth:21): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 114.595108] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/29 23:44:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 114.649796] 9pnet_virtio: no channels available for device ./file0/file0 [ 114.663988] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000600)=""/31, 0x1f}], 0x1, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 114.699451] FAULT_INJECTION: forcing a failure. [ 114.699451] name failslab, interval 1, probability 0, space 0, times 0 [ 114.710858] CPU: 0 PID: 16888 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 114.712401] 9pnet_virtio: no channels available for device ./file0 [ 114.718127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.718133] Call Trace: [ 114.718154] dump_stack+0x194/0x24d [ 114.718174] ? arch_local_irq_restore+0x53/0x53 [ 114.718212] should_fail+0x8c0/0xa40 [ 114.718229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 114.753478] ? __kernel_text_address+0xd/0x40 [ 114.757975] ? unwind_get_return_address+0x61/0xa0 [ 114.762930] ? find_held_lock+0x35/0x1d0 [ 114.767005] ? __lock_is_held+0xb6/0x140 [ 114.771217] ? check_same_owner+0x320/0x320 [ 114.775553] ? rcu_note_context_switch+0x710/0x710 [ 114.780510] should_failslab+0xec/0x120 [ 114.784495] kmem_cache_alloc_trace+0x4b/0x740 [ 114.789089] ? __kmalloc_node+0x33/0x70 [ 114.793077] ? __kmalloc_node+0x33/0x70 2018/03/29 23:44:09 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:09 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 114.797079] ? rcu_read_lock_sched_held+0x108/0x120 [ 114.802125] __memcg_init_list_lru_node+0x169/0x270 [ 114.807159] ? list_lru_add+0x7c0/0x7c0 [ 114.811141] ? __kmalloc_node+0x47/0x70 [ 114.815144] __list_lru_init+0x544/0x750 [ 114.819223] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 114.825122] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 114.830161] ? lockdep_init_map+0x9/0x10 [ 114.834236] sget_userns+0x6b1/0xe40 [ 114.837951] ? set_anon_super+0x20/0x20 [ 114.841935] ? put_filp+0x90/0x90 [ 114.845385] ? destroy_unused_super.part.6+0xd0/0xd0 [ 114.850484] ? alloc_vfsmnt+0x762/0x9c0 [ 114.854451] ? path_lookupat+0x238/0xba0 [ 114.858512] ? mnt_free_id.isra.21+0x50/0x50 [ 114.862935] ? trace_hardirqs_off+0x10/0x10 [ 114.867266] ? putname+0xee/0x130 [ 114.870729] ? cap_capable+0x1b5/0x230 [ 114.874629] ? security_capable+0x8e/0xc0 [ 114.878780] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 114.883964] ? ns_capable_common+0xcf/0x160 [ 114.888288] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 114.893473] mount_ns+0x6d/0x190 [ 114.896847] rpc_mount+0x9e/0xd0 [ 114.900220] mount_fs+0x66/0x2d0 [ 114.903591] vfs_kern_mount.part.26+0xc6/0x4a0 [ 114.908175] ? may_umount+0xa0/0xa0 [ 114.911795] ? _raw_read_unlock+0x22/0x30 [ 114.915940] ? __get_fs_type+0x8a/0xc0 [ 114.919833] do_mount+0xea4/0x2bb0 [ 114.923363] ? __might_fault+0x110/0x1d0 [ 114.927437] ? copy_mount_string+0x40/0x40 [ 114.931669] ? check_same_owner+0x320/0x320 [ 114.935989] ? __check_object_size+0x8b/0x530 [ 114.940495] ? __might_sleep+0x95/0x190 [ 114.944480] ? kasan_check_write+0x14/0x20 [ 114.948715] ? _copy_from_user+0x99/0x110 [ 114.953050] ? memdup_user+0x5e/0x90 [ 114.956774] ? copy_mount_options+0x1f7/0x2e0 [ 114.961288] SyS_mount+0xab/0x120 [ 114.964744] ? copy_mnt_ns+0xb30/0xb30 [ 114.968637] do_syscall_64+0x281/0x940 [ 114.968681] 9pnet_virtio: no channels available for device ./file0 [ 114.972514] ? __do_page_fault+0xc90/0xc90 [ 114.972530] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 114.972545] ? syscall_return_slowpath+0x550/0x550 [ 114.972558] ? syscall_return_slowpath+0x2ac/0x550 2018/03/29 23:44:09 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5deb", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 114.972579] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 114.972601] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 114.972626] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 114.972634] RIP: 0033:0x4548b9 [ 114.972640] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 114.972652] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 115.031960] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 115.039225] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 23:44:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000600)=""/31, 0x1f}], 0x1, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:09 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:09 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:09 executing program 6 (fault-call:12 fault-nth:22): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:09 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0x0, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) [ 115.046489] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 115.053753] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/29 23:44:09 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c", &(0x7f0000000380)=""/73}, 0x18) [ 115.119128] 9pnet_virtio: no channels available for device ./file0 [ 115.161778] FAULT_INJECTION: forcing a failure. [ 115.161778] name failslab, interval 1, probability 0, space 0, times 0 [ 115.173110] CPU: 0 PID: 16948 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 115.178240] 9pnet_virtio: no channels available for device ./file0/file0 [ 115.180377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.180381] Call Trace: [ 115.180402] dump_stack+0x194/0x24d [ 115.180421] ? arch_local_irq_restore+0x53/0x53 [ 115.180433] ? __save_stack_trace+0x7e/0xd0 [ 115.190066] 9pnet_virtio: no channels available for device ./file0 [ 115.196631] should_fail+0x8c0/0xa40 [ 115.196652] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 115.196665] ? kasan_kmalloc+0xad/0xe0 [ 115.196672] ? kmem_cache_alloc_trace+0x136/0x740 [ 115.196683] ? __memcg_init_list_lru_node+0x169/0x270 [ 115.196691] ? __list_lru_init+0x544/0x750 [ 115.196701] ? sget_userns+0x6b1/0xe40 [ 115.248880] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 115.253640] ? do_mount+0xea4/0x2bb0 [ 115.257355] ? SyS_mount+0xab/0x120 [ 115.260982] ? do_syscall_64+0x281/0x940 [ 115.265042] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 115.270423] ? find_held_lock+0x35/0x1d0 [ 115.274495] ? __lock_is_held+0xb6/0x140 [ 115.278567] ? check_same_owner+0x320/0x320 [ 115.282873] ? rcu_note_context_switch+0x710/0x710 [ 115.287794] should_failslab+0xec/0x120 [ 115.291748] kmem_cache_alloc_trace+0x4b/0x740 [ 115.296306] ? __kmalloc_node+0x33/0x70 [ 115.300255] ? __kmalloc_node+0x33/0x70 [ 115.304205] ? rcu_read_lock_sched_held+0x108/0x120 [ 115.309206] __memcg_init_list_lru_node+0x169/0x270 [ 115.314203] ? list_lru_add+0x7c0/0x7c0 [ 115.318153] ? __kmalloc_node+0x47/0x70 [ 115.322116] __list_lru_init+0x544/0x750 [ 115.326165] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 115.332035] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 115.337050] ? lockdep_init_map+0x9/0x10 [ 115.341094] sget_userns+0x6b1/0xe40 [ 115.344783] ? set_anon_super+0x20/0x20 [ 115.348741] ? put_filp+0x90/0x90 [ 115.352172] ? destroy_unused_super.part.6+0xd0/0xd0 [ 115.357249] ? alloc_vfsmnt+0x762/0x9c0 [ 115.361206] ? path_lookupat+0x238/0xba0 [ 115.365246] ? mnt_free_id.isra.21+0x50/0x50 [ 115.369635] ? trace_hardirqs_off+0x10/0x10 [ 115.373934] ? putname+0xee/0x130 [ 115.377370] ? cap_capable+0x1b5/0x230 [ 115.381243] ? security_capable+0x8e/0xc0 [ 115.385372] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 115.390536] ? ns_capable_common+0xcf/0x160 [ 115.394838] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 115.400005] mount_ns+0x6d/0x190 [ 115.403366] rpc_mount+0x9e/0xd0 [ 115.406715] mount_fs+0x66/0x2d0 [ 115.410065] vfs_kern_mount.part.26+0xc6/0x4a0 [ 115.414627] ? may_umount+0xa0/0xa0 [ 115.418237] ? _raw_read_unlock+0x22/0x30 [ 115.422365] ? __get_fs_type+0x8a/0xc0 [ 115.426251] do_mount+0xea4/0x2bb0 [ 115.429767] ? __might_fault+0x110/0x1d0 [ 115.433820] ? copy_mount_string+0x40/0x40 [ 115.438039] ? check_same_owner+0x320/0x320 [ 115.442345] ? __check_object_size+0x8b/0x530 [ 115.446832] ? __might_sleep+0x95/0x190 [ 115.450792] ? kasan_check_write+0x14/0x20 [ 115.455020] ? _copy_from_user+0x99/0x110 [ 115.459159] ? memdup_user+0x5e/0x90 [ 115.462850] ? copy_mount_options+0x1f7/0x2e0 [ 115.467326] SyS_mount+0xab/0x120 [ 115.470763] ? copy_mnt_ns+0xb30/0xb30 [ 115.474649] do_syscall_64+0x281/0x940 [ 115.478511] ? __do_page_fault+0xc90/0xc90 [ 115.482719] ? _raw_spin_unlock_irq+0x27/0x70 [ 115.487191] ? finish_task_switch+0x1c1/0x7e0 [ 115.491924] ? syscall_return_slowpath+0x550/0x550 [ 115.496830] ? syscall_return_slowpath+0x2ac/0x550 [ 115.501737] ? prepare_exit_to_usermode+0x350/0x350 [ 115.506732] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 115.512089] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 115.516915] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 115.522077] RIP: 0033:0x4548b9 [ 115.525240] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 115.532925] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 115.540172] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 115.547417] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 115.554661] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/29 23:44:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:10 executing program 6 (fault-call:12 fault-nth:23): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:10 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000600)=""/31, 0x1f}], 0x1, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:10 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e6", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:10 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) [ 115.561906] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/29 23:44:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}], 0x1, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 115.649662] 9pnet_virtio: no channels available for device ./file0/file0 [ 115.661541] FAULT_INJECTION: forcing a failure. [ 115.661541] name failslab, interval 1, probability 0, space 0, times 0 [ 115.665677] 9pnet_virtio: no channels available for device ./file0 [ 115.672819] CPU: 1 PID: 16981 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 115.672827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.672832] Call Trace: [ 115.672849] dump_stack+0x194/0x24d [ 115.672867] ? arch_local_irq_restore+0x53/0x53 [ 115.699584] 9pnet_virtio: no channels available for device ./file0 [ 115.701957] ? __save_stack_trace+0x7e/0xd0 [ 115.701992] should_fail+0x8c0/0xa40 [ 115.702014] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 115.726063] ? kasan_kmalloc+0xad/0xe0 [ 115.729950] ? kmem_cache_alloc_trace+0x136/0x740 [ 115.734819] ? __memcg_init_list_lru_node+0x169/0x270 [ 115.740026] ? __list_lru_init+0x544/0x750 [ 115.744281] ? sget_userns+0x6b1/0xe40 [ 115.748197] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 115.752946] ? do_mount+0xea4/0x2bb0 [ 115.756639] ? SyS_mount+0xab/0x120 [ 115.760272] ? do_syscall_64+0x281/0x940 [ 115.764320] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 115.769669] ? find_held_lock+0x35/0x1d0 [ 115.773717] ? __lock_is_held+0xb6/0x140 [ 115.777773] ? check_same_owner+0x320/0x320 [ 115.782074] ? rcu_note_context_switch+0x710/0x710 [ 115.786994] should_failslab+0xec/0x120 [ 115.790949] kmem_cache_alloc_trace+0x4b/0x740 [ 115.795509] ? __kmalloc_node+0x33/0x70 [ 115.799456] ? __kmalloc_node+0x33/0x70 [ 115.803405] ? rcu_read_lock_sched_held+0x108/0x120 [ 115.808406] __memcg_init_list_lru_node+0x169/0x270 [ 115.813406] ? list_lru_add+0x7c0/0x7c0 [ 115.817358] ? __kmalloc_node+0x47/0x70 [ 115.821324] __list_lru_init+0x544/0x750 [ 115.825370] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 115.831233] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 115.836234] ? lockdep_init_map+0x9/0x10 [ 115.840279] sget_userns+0x6b1/0xe40 [ 115.843968] ? set_anon_super+0x20/0x20 [ 115.847924] ? put_filp+0x90/0x90 [ 115.851358] ? destroy_unused_super.part.6+0xd0/0xd0 [ 115.856439] ? alloc_vfsmnt+0x762/0x9c0 [ 115.860386] ? path_lookupat+0x238/0xba0 [ 115.864422] ? mnt_free_id.isra.21+0x50/0x50 [ 115.868813] ? trace_hardirqs_off+0x10/0x10 [ 115.873112] ? putname+0xee/0x130 [ 115.876551] ? cap_capable+0x1b5/0x230 [ 115.880425] ? security_capable+0x8e/0xc0 [ 115.884553] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 115.889718] ? ns_capable_common+0xcf/0x160 [ 115.894029] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 115.899194] mount_ns+0x6d/0x190 [ 115.902547] rpc_mount+0x9e/0xd0 [ 115.905896] mount_fs+0x66/0x2d0 [ 115.909243] vfs_kern_mount.part.26+0xc6/0x4a0 [ 115.913804] ? may_umount+0xa0/0xa0 [ 115.917407] ? _raw_read_unlock+0x22/0x30 [ 115.921533] ? __get_fs_type+0x8a/0xc0 [ 115.925405] do_mount+0xea4/0x2bb0 [ 115.928917] ? __might_fault+0x110/0x1d0 [ 115.932965] ? copy_mount_string+0x40/0x40 [ 115.937178] ? check_same_owner+0x320/0x320 [ 115.941481] ? __check_object_size+0x8b/0x530 [ 115.945965] ? __might_sleep+0x95/0x190 [ 115.949930] ? kasan_check_write+0x14/0x20 [ 115.954144] ? _copy_from_user+0x99/0x110 [ 115.958447] ? memdup_user+0x5e/0x90 [ 115.962140] ? copy_mount_options+0x1f7/0x2e0 [ 115.966621] SyS_mount+0xab/0x120 [ 115.970051] ? copy_mnt_ns+0xb30/0xb30 [ 115.973925] do_syscall_64+0x281/0x940 [ 115.977788] ? __do_page_fault+0xc90/0xc90 [ 115.981996] ? _raw_spin_unlock_irq+0x27/0x70 [ 115.986470] ? finish_task_switch+0x1c1/0x7e0 [ 115.991034] ? syscall_return_slowpath+0x550/0x550 [ 115.995940] ? syscall_return_slowpath+0x2ac/0x550 [ 116.000849] ? prepare_exit_to_usermode+0x350/0x350 [ 116.005844] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 116.011189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.016023] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 116.021191] RIP: 0033:0x4548b9 [ 116.024357] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 116.032043] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 116.039287] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 116.046529] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 116.053782] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 116.061030] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/29 23:44:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}], 0x1, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:10 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:10 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e6", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:10 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:10 executing program 6 (fault-call:12 fault-nth:24): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}], 0x1, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:10 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 116.170344] 9pnet_virtio: no channels available for device ./file0 [ 116.179777] 9pnet_virtio: no channels available for device ./file0/file0 [ 116.199602] FAULT_INJECTION: forcing a failure. [ 116.199602] name failslab, interval 1, probability 0, space 0, times 0 [ 116.210944] CPU: 0 PID: 17022 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 2018/03/29 23:44:10 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5", &(0x7f0000000380)=""/73}, 0x18) [ 116.218231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.227589] Call Trace: [ 116.230193] dump_stack+0x194/0x24d [ 116.233847] ? arch_local_irq_restore+0x53/0x53 [ 116.238611] ? __save_stack_trace+0x7e/0xd0 [ 116.242976] should_fail+0x8c0/0xa40 [ 116.246707] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 116.251829] ? kasan_kmalloc+0xad/0xe0 [ 116.255731] ? kmem_cache_alloc_trace+0x136/0x740 [ 116.259331] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:10 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e6", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 116.260576] ? __memcg_init_list_lru_node+0x169/0x270 [ 116.260585] ? __list_lru_init+0x544/0x750 [ 116.260593] ? sget_userns+0x6b1/0xe40 [ 116.260608] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 116.260619] ? do_mount+0xea4/0x2bb0 [ 116.288634] ? SyS_mount+0xab/0x120 [ 116.292271] ? do_syscall_64+0x281/0x940 [ 116.296331] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 116.301708] ? find_held_lock+0x35/0x1d0 [ 116.305786] ? __lock_is_held+0xb6/0x140 [ 116.309878] ? check_same_owner+0x320/0x320 [ 116.314213] ? rcu_note_context_switch+0x710/0x710 [ 116.314939] 9pnet_virtio: no channels available for device ./file0 [ 116.319153] should_failslab+0xec/0x120 [ 116.319168] kmem_cache_alloc_trace+0x4b/0x740 [ 116.319179] ? __kmalloc_node+0x33/0x70 [ 116.319188] ? __kmalloc_node+0x33/0x70 [ 116.319202] ? rcu_read_lock_sched_held+0x108/0x120 [ 116.319228] __memcg_init_list_lru_node+0x169/0x270 [ 116.319250] ? list_lru_add+0x7c0/0x7c0 [ 116.319262] ? __kmalloc_node+0x47/0x70 [ 116.319285] __list_lru_init+0x544/0x750 [ 116.364189] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 2018/03/29 23:44:10 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 116.370089] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 116.375128] ? lockdep_init_map+0x9/0x10 [ 116.379199] sget_userns+0x6b1/0xe40 [ 116.382919] ? set_anon_super+0x20/0x20 [ 116.386912] ? put_filp+0x90/0x90 [ 116.390382] ? destroy_unused_super.part.6+0xd0/0xd0 [ 116.395484] ? alloc_vfsmnt+0x762/0x9c0 [ 116.399454] ? path_lookupat+0x238/0xba0 [ 116.403504] ? mnt_free_id.isra.21+0x50/0x50 [ 116.407897] ? trace_hardirqs_off+0x10/0x10 [ 116.412199] ? putname+0xee/0x130 [ 116.415635] ? cap_capable+0x1b5/0x230 [ 116.419507] ? security_capable+0x8e/0xc0 [ 116.423636] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 116.428801] ? ns_capable_common+0xcf/0x160 [ 116.433108] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 116.438278] mount_ns+0x6d/0x190 [ 116.441628] rpc_mount+0x9e/0xd0 [ 116.444973] mount_fs+0x66/0x2d0 [ 116.448322] vfs_kern_mount.part.26+0xc6/0x4a0 [ 116.452883] ? may_umount+0xa0/0xa0 [ 116.456491] ? _raw_read_unlock+0x22/0x30 [ 116.460616] ? __get_fs_type+0x8a/0xc0 [ 116.464490] do_mount+0xea4/0x2bb0 [ 116.468004] ? __might_fault+0x110/0x1d0 [ 116.472062] ? copy_mount_string+0x40/0x40 [ 116.476271] ? check_same_owner+0x320/0x320 [ 116.480577] ? __check_object_size+0x8b/0x530 [ 116.485060] ? __might_sleep+0x95/0x190 [ 116.489025] ? kasan_check_write+0x14/0x20 [ 116.493241] ? _copy_from_user+0x99/0x110 [ 116.497942] ? memdup_user+0x5e/0x90 [ 116.501639] ? copy_mount_options+0x1f7/0x2e0 [ 116.506118] SyS_mount+0xab/0x120 [ 116.509548] ? copy_mnt_ns+0xb30/0xb30 [ 116.513415] do_syscall_64+0x281/0x940 [ 116.517277] ? __do_page_fault+0xc90/0xc90 [ 116.521495] ? _raw_spin_unlock_irq+0x27/0x70 [ 116.525969] ? finish_task_switch+0x1c1/0x7e0 [ 116.530441] ? syscall_return_slowpath+0x550/0x550 [ 116.535346] ? syscall_return_slowpath+0x2ac/0x550 [ 116.540253] ? prepare_exit_to_usermode+0x350/0x350 [ 116.545245] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 116.550588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 116.555424] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 116.560587] RIP: 0033:0x4548b9 [ 116.563753] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 23:44:11 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10d", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 116.571444] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 116.578689] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 116.585939] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 116.593194] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 116.600437] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 116.678999] 9pnet_virtio: no channels available for device ./file0/file0 [ 116.686782] 9pnet_virtio: no channels available for device ./file0 [ 116.691786] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:11 executing program 6 (fault-call:12 fault-nth:25): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:11 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:11 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0a", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:11 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:11 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10d", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 116.767650] FAULT_INJECTION: forcing a failure. [ 116.767650] name failslab, interval 1, probability 0, space 0, times 0 [ 116.778988] CPU: 1 PID: 17074 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 116.786260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.795619] Call Trace: [ 116.798207] dump_stack+0x194/0x24d [ 116.801846] ? arch_local_irq_restore+0x53/0x53 [ 116.806503] ? __save_stack_trace+0x7e/0xd0 [ 116.810832] should_fail+0x8c0/0xa40 [ 116.814536] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 116.819622] ? kasan_kmalloc+0xad/0xe0 [ 116.823489] ? kmem_cache_alloc_trace+0x136/0x740 [ 116.828309] ? __memcg_init_list_lru_node+0x169/0x270 [ 116.833478] ? __list_lru_init+0x544/0x750 [ 116.837690] ? sget_userns+0x6b1/0xe40 [ 116.841648] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 116.846383] ? do_mount+0xea4/0x2bb0 [ 116.850073] ? SyS_mount+0xab/0x120 [ 116.853677] ? do_syscall_64+0x281/0x940 [ 116.857718] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 116.863118] ? find_held_lock+0x35/0x1d0 [ 116.867178] ? __lock_is_held+0xb6/0x140 [ 116.871251] ? check_same_owner+0x320/0x320 [ 116.875557] ? rcu_note_context_switch+0x710/0x710 [ 116.883039] should_failslab+0xec/0x120 [ 116.886998] kmem_cache_alloc_trace+0x4b/0x740 [ 116.891562] ? __kmalloc_node+0x33/0x70 [ 116.895516] ? __kmalloc_node+0x33/0x70 [ 116.899474] ? rcu_read_lock_sched_held+0x108/0x120 [ 116.904487] __memcg_init_list_lru_node+0x169/0x270 [ 116.909494] ? list_lru_add+0x7c0/0x7c0 [ 116.913452] ? __kmalloc_node+0x47/0x70 [ 116.917429] __list_lru_init+0x544/0x750 [ 116.921486] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 116.927355] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 116.932368] ? lockdep_init_map+0x9/0x10 [ 116.936419] sget_userns+0x6b1/0xe40 [ 116.940110] ? set_anon_super+0x20/0x20 [ 116.944076] ? put_filp+0x90/0x90 [ 116.947515] ? destroy_unused_super.part.6+0xd0/0xd0 [ 116.952598] ? alloc_vfsmnt+0x762/0x9c0 [ 116.956552] ? path_lookupat+0x238/0xba0 [ 116.960594] ? mnt_free_id.isra.21+0x50/0x50 [ 116.965111] ? trace_hardirqs_off+0x10/0x10 [ 116.969425] ? putname+0xee/0x130 [ 116.972864] ? cap_capable+0x1b5/0x230 [ 116.976743] ? security_capable+0x8e/0xc0 [ 116.980877] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 116.986045] ? ns_capable_common+0xcf/0x160 [ 116.990355] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 116.995524] mount_ns+0x6d/0x190 [ 116.998880] rpc_mount+0x9e/0xd0 [ 117.002234] mount_fs+0x66/0x2d0 [ 117.005590] vfs_kern_mount.part.26+0xc6/0x4a0 [ 117.010243] ? may_umount+0xa0/0xa0 [ 117.013850] ? _raw_read_unlock+0x22/0x30 [ 117.017980] ? __get_fs_type+0x8a/0xc0 [ 117.021863] do_mount+0xea4/0x2bb0 [ 117.025385] ? __might_fault+0x110/0x1d0 [ 117.029447] ? copy_mount_string+0x40/0x40 [ 117.033664] ? check_same_owner+0x320/0x320 [ 117.037968] ? __check_object_size+0x8b/0x530 [ 117.042460] ? __might_sleep+0x95/0x190 [ 117.046434] ? kasan_check_write+0x14/0x20 [ 117.050651] ? _copy_from_user+0x99/0x110 [ 117.054786] ? memdup_user+0x5e/0x90 [ 117.058478] ? copy_mount_options+0x1f7/0x2e0 [ 117.063017] SyS_mount+0xab/0x120 [ 117.066455] ? copy_mnt_ns+0xb30/0xb30 [ 117.070329] do_syscall_64+0x281/0x940 [ 117.074193] ? __do_page_fault+0xc90/0xc90 [ 117.078408] ? _raw_spin_unlock_irq+0x27/0x70 [ 117.082884] ? finish_task_switch+0x1c1/0x7e0 [ 117.087362] ? syscall_return_slowpath+0x550/0x550 [ 117.092273] ? syscall_return_slowpath+0x2ac/0x550 [ 117.097185] ? prepare_exit_to_usermode+0x350/0x350 [ 117.102185] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 117.107539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.112376] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 23:44:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:11 executing program 3 (fault-call:0 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 117.117543] RIP: 0033:0x4548b9 [ 117.120712] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.128404] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 117.135654] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 117.142901] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.150147] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 117.157396] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/29 23:44:11 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000fa"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:11 executing program 6 (fault-call:12 fault-nth:26): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 117.187829] FAULT_INJECTION: forcing a failure. [ 117.187829] name failslab, interval 1, probability 0, space 0, times 0 [ 117.199143] CPU: 1 PID: 17093 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #41 [ 117.206411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.215745] Call Trace: [ 117.218315] dump_stack+0x194/0x24d [ 117.221925] ? arch_local_irq_restore+0x53/0x53 [ 117.226570] ? finish_task_switch+0x1c1/0x7e0 [ 117.231042] ? finish_task_switch+0x182/0x7e0 [ 117.235528] should_fail+0x8c0/0xa40 [ 117.239225] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 117.244328] ? __sched_text_start+0x8/0x8 [ 117.248451] ? find_held_lock+0x35/0x1d0 [ 117.252517] ? check_same_owner+0x320/0x320 [ 117.256817] ? find_held_lock+0x35/0x1d0 [ 117.260869] should_failslab+0xec/0x120 [ 117.264822] kmem_cache_alloc_trace+0x4b/0x740 [ 117.269383] ? security_capable+0x8e/0xc0 [ 117.273514] ? ns_capable_common+0xcf/0x160 [ 117.277819] dev_map_alloc+0x22b/0x7f0 [ 117.281683] ? __might_sleep+0x95/0x190 [ 117.285635] ? dev_map_notification+0x600/0x600 [ 117.290284] ? security_bpf+0x89/0xb0 [ 117.294060] ? dev_map_notification+0x600/0x600 [ 117.298710] SyS_bpf+0x886/0x4890 [ 117.302141] ? trace_hardirqs_off+0x10/0x10 [ 117.306440] ? __fdget_pos+0x12b/0x190 [ 117.310312] ? bpf_prog_get+0x20/0x20 [ 117.314095] ? trace_event_raw_event_lock+0x340/0x340 [ 117.319265] ? find_held_lock+0x35/0x1d0 [ 117.323311] ? perf_trace_lock+0xd6/0x900 [ 117.327446] ? trace_event_raw_event_lock+0x340/0x340 [ 117.332614] ? _parse_integer+0x140/0x140 [ 117.336738] ? check_same_owner+0x320/0x320 [ 117.341046] ? find_held_lock+0x35/0x1d0 [ 117.345084] ? trace_hardirqs_off+0x10/0x10 [ 117.349394] ? get_pid_task+0x93/0x140 [ 117.353260] ? perf_trace_lock+0xd6/0x900 [ 117.357398] ? find_held_lock+0x35/0x1d0 [ 117.361446] ? __f_unlock_pos+0x19/0x20 [ 117.365400] ? lock_downgrade+0x980/0x980 [ 117.369542] ? get_pid_task+0xbc/0x140 [ 117.373410] ? proc_fail_nth_write+0x9b/0x1d0 [ 117.377882] ? map_files_get_link+0x3a0/0x3a0 [ 117.382356] ? handle_mm_fault+0x35b/0xb10 [ 117.386574] ? find_held_lock+0x35/0x1d0 [ 117.390618] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 117.395437] ? vfs_write+0x374/0x510 [ 117.399133] ? wait_for_completion+0x770/0x770 [ 117.403729] ? __sb_end_write+0xa0/0xd0 [ 117.407685] ? fput+0xd2/0x140 [ 117.410858] ? SyS_write+0x184/0x220 [ 117.414564] ? do_syscall_64+0xb7/0x940 [ 117.418519] ? bpf_prog_get+0x20/0x20 [ 117.422297] do_syscall_64+0x281/0x940 [ 117.426162] ? __do_page_fault+0xc90/0xc90 [ 117.430373] ? _raw_spin_unlock_irq+0x27/0x70 [ 117.434846] ? finish_task_switch+0x1c1/0x7e0 [ 117.439324] ? syscall_return_slowpath+0x550/0x550 [ 117.444241] ? syscall_return_slowpath+0x2ac/0x550 [ 117.449172] ? prepare_exit_to_usermode+0x350/0x350 [ 117.454171] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 117.459958] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.464789] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 117.469954] RIP: 0033:0x4548b9 [ 117.473118] RSP: 002b:00007ffae64e4c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 117.480800] RAX: ffffffffffffffda RBX: 00007ffae64e56d4 RCX: 00000000004548b9 2018/03/29 23:44:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:11 executing program 3 (fault-call:0 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) [ 117.488046] RDX: 0000000000000274 RSI: 0000000020000080 RDI: 0000000000000000 [ 117.495290] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.502535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 117.509780] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000000 [ 117.559306] FAULT_INJECTION: forcing a failure. [ 117.559306] name failslab, interval 1, probability 0, space 0, times 0 [ 117.570653] CPU: 1 PID: 17103 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 117.577927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.586735] FAULT_INJECTION: forcing a failure. [ 117.586735] name failslab, interval 1, probability 0, space 0, times 0 [ 117.587271] Call Trace: [ 117.587292] dump_stack+0x194/0x24d [ 117.587313] ? arch_local_irq_restore+0x53/0x53 [ 117.587324] ? __save_stack_trace+0x7e/0xd0 [ 117.587363] should_fail+0x8c0/0xa40 [ 117.587385] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 117.622458] ? kasan_kmalloc+0xad/0xe0 [ 117.626333] ? kmem_cache_alloc_trace+0x136/0x740 [ 117.631178] ? __memcg_init_list_lru_node+0x169/0x270 [ 117.636364] ? __list_lru_init+0x544/0x750 [ 117.640587] ? sget_userns+0x6b1/0xe40 [ 117.644468] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 117.649212] ? do_mount+0xea4/0x2bb0 [ 117.652919] ? SyS_mount+0xab/0x120 [ 117.656535] ? do_syscall_64+0x281/0x940 [ 117.660586] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 117.665956] ? find_held_lock+0x35/0x1d0 [ 117.670025] ? __lock_is_held+0xb6/0x140 [ 117.674103] ? check_same_owner+0x320/0x320 [ 117.678417] ? rcu_note_context_switch+0x710/0x710 [ 117.683356] should_failslab+0xec/0x120 [ 117.687316] kmem_cache_alloc_trace+0x4b/0x740 [ 117.691885] ? __kmalloc_node+0x33/0x70 [ 117.695838] ? __kmalloc_node+0x33/0x70 [ 117.699796] ? rcu_read_lock_sched_held+0x108/0x120 [ 117.704805] __memcg_init_list_lru_node+0x169/0x270 [ 117.709814] ? list_lru_add+0x7c0/0x7c0 [ 117.713774] ? __kmalloc_node+0x47/0x70 [ 117.717745] __list_lru_init+0x544/0x750 [ 117.721800] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 117.727672] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 117.732686] ? lockdep_init_map+0x9/0x10 [ 117.736737] sget_userns+0x6b1/0xe40 [ 117.740432] ? set_anon_super+0x20/0x20 [ 117.744398] ? put_filp+0x90/0x90 [ 117.747850] ? destroy_unused_super.part.6+0xd0/0xd0 [ 117.753113] ? alloc_vfsmnt+0x762/0x9c0 [ 117.757069] ? path_lookupat+0x238/0xba0 [ 117.761113] ? mnt_free_id.isra.21+0x50/0x50 [ 117.765514] ? trace_hardirqs_off+0x10/0x10 [ 117.769821] ? putname+0xee/0x130 [ 117.773265] ? cap_capable+0x1b5/0x230 [ 117.777147] ? security_capable+0x8e/0xc0 [ 117.781282] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 117.786452] ? ns_capable_common+0xcf/0x160 [ 117.790765] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 117.795936] mount_ns+0x6d/0x190 [ 117.799295] rpc_mount+0x9e/0xd0 [ 117.802652] mount_fs+0x66/0x2d0 [ 117.806015] vfs_kern_mount.part.26+0xc6/0x4a0 [ 117.810584] ? may_umount+0xa0/0xa0 [ 117.814195] ? _raw_read_unlock+0x22/0x30 [ 117.818325] ? __get_fs_type+0x8a/0xc0 [ 117.822211] do_mount+0xea4/0x2bb0 [ 117.825735] ? __might_fault+0x110/0x1d0 [ 117.829789] ? copy_mount_string+0x40/0x40 [ 117.834004] ? check_same_owner+0x320/0x320 [ 117.838313] ? __check_object_size+0x8b/0x530 [ 117.842805] ? __might_sleep+0x95/0x190 [ 117.846775] ? kasan_check_write+0x14/0x20 [ 117.850991] ? _copy_from_user+0x99/0x110 [ 117.855128] ? memdup_user+0x5e/0x90 [ 117.858829] ? copy_mount_options+0x1f7/0x2e0 [ 117.863317] SyS_mount+0xab/0x120 [ 117.866756] ? copy_mnt_ns+0xb30/0xb30 [ 117.870629] do_syscall_64+0x281/0x940 [ 117.874499] ? __do_page_fault+0xc90/0xc90 [ 117.878715] ? _raw_spin_unlock_irq+0x27/0x70 [ 117.883199] ? finish_task_switch+0x1c1/0x7e0 [ 117.887682] ? syscall_return_slowpath+0x550/0x550 [ 117.892594] ? syscall_return_slowpath+0x2ac/0x550 [ 117.897506] ? prepare_exit_to_usermode+0x350/0x350 [ 117.902506] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 117.907864] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 117.912698] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 117.917866] RIP: 0033:0x4548b9 [ 117.921036] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 117.928728] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 117.935980] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 117.943233] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 117.950485] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 117.957733] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 117.965034] CPU: 0 PID: 17108 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #41 [ 117.972310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.981412] 9pnet_virtio: no channels available for device ./file0/file0 [ 117.981654] Call Trace: [ 117.981673] dump_stack+0x194/0x24d [ 117.981690] ? arch_local_irq_restore+0x53/0x53 [ 117.992042] 9pnet_virtio: no channels available for device ./file0 [ 117.994707] should_fail+0x8c0/0xa40 [ 117.994728] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 117.994761] ? rcu_read_lock_sched_held+0x108/0x120 [ 117.994783] ? find_held_lock+0x35/0x1d0 [ 118.023512] ? check_same_owner+0x320/0x320 [ 118.027819] ? rcu_note_context_switch+0x710/0x710 [ 118.032740] should_failslab+0xec/0x120 [ 118.036691] kmem_cache_alloc_node_trace+0x5a/0x760 [ 118.041686] ? bpf_map_init_from_attr+0x320/0x320 [ 118.046517] __kmalloc_node+0x33/0x70 [ 118.050299] bpf_map_area_alloc+0x32/0x80 [ 118.054425] dev_map_alloc+0x524/0x7f0 [ 118.058295] ? dev_map_notification+0x600/0x600 [ 118.062945] ? security_bpf+0x89/0xb0 [ 118.066723] ? dev_map_notification+0x600/0x600 [ 118.071369] SyS_bpf+0x886/0x4890 [ 118.074800] ? trace_hardirqs_off+0x10/0x10 [ 118.079098] ? __fdget_pos+0x12b/0x190 [ 118.082966] ? bpf_prog_get+0x20/0x20 [ 118.086748] ? trace_event_raw_event_lock+0x340/0x340 [ 118.091939] ? find_held_lock+0x35/0x1d0 [ 118.095983] ? perf_trace_lock+0xd6/0x900 [ 118.100116] ? trace_event_raw_event_lock+0x340/0x340 [ 118.105280] ? _parse_integer+0x140/0x140 [ 118.109400] ? check_same_owner+0x320/0x320 [ 118.113700] ? find_held_lock+0x35/0x1d0 [ 118.117736] ? trace_hardirqs_off+0x10/0x10 [ 118.122042] ? get_pid_task+0x93/0x140 [ 118.125918] ? perf_trace_lock+0xd6/0x900 [ 118.130050] ? find_held_lock+0x35/0x1d0 [ 118.134097] ? __f_unlock_pos+0x19/0x20 [ 118.138050] ? lock_downgrade+0x980/0x980 [ 118.142172] ? get_pid_task+0xbc/0x140 [ 118.146037] ? proc_fail_nth_write+0x9b/0x1d0 [ 118.150510] ? map_files_get_link+0x3a0/0x3a0 [ 118.154981] ? handle_mm_fault+0x35b/0xb10 [ 118.159198] ? find_held_lock+0x35/0x1d0 [ 118.163244] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 118.168063] ? vfs_write+0x374/0x510 [ 118.171753] ? wait_for_completion+0x770/0x770 [ 118.176344] ? __sb_end_write+0xa0/0xd0 [ 118.180300] ? fput+0xd2/0x140 [ 118.183470] ? SyS_write+0x184/0x220 [ 118.187173] ? do_syscall_64+0xb7/0x940 [ 118.191128] ? bpf_prog_get+0x20/0x20 [ 118.194908] do_syscall_64+0x281/0x940 [ 118.198770] ? __do_page_fault+0xc90/0xc90 [ 118.202978] ? _raw_spin_unlock_irq+0x27/0x70 [ 118.207450] ? finish_task_switch+0x1c1/0x7e0 [ 118.211926] ? syscall_return_slowpath+0x550/0x550 [ 118.216834] ? syscall_return_slowpath+0x2ac/0x550 [ 118.221743] ? prepare_exit_to_usermode+0x350/0x350 [ 118.226737] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 118.232085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.236911] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 118.242077] RIP: 0033:0x4548b9 [ 118.245240] RSP: 002b:00007ffae64e4c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.252924] RAX: ffffffffffffffda RBX: 00007ffae64e56d4 RCX: 00000000004548b9 [ 118.260167] RDX: 0000000000000274 RSI: 0000000020000080 RDI: 0000000000000000 [ 118.267411] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 118.274657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 118.281900] R13: 000000000000003c R14: 00000000006f2640 R15: 0000000000000001 2018/03/29 23:44:12 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10d", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:12 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000fa"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000280)={r2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:12 executing program 6 (fault-call:12 fault-nth:27): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:12 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0a", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:12 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x0, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:12 executing program 3: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0xffffffff, 0x5a, 0x10}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x4, 0x4, 0x8db, 0x0, r0, 0x0, [0x115]}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r1}, 0xfed4) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000600)={&(0x7f00000005c0)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x0, 0xf1, 0xa, &(0x7f0000000640)="30e4bdea95faaed4d816832a2bdc905f94d2d33dcb986f54dcf53fb7b51a8868c210394494b8531318689f115468742a098a2acc5dab6c59e62b59eddb39f50200c3d24b6f302801bee731e5d7e5288870d7a4cb568ea9001a16e20f5c0026214a10e0456e1a332a8839a3849dc36ed6452e9c05f97f49b5b7ae6c263d06150c94e94fc020947e0e0ed243428c5b0773e87c3a6cbc562c685a7eddfa8344de63cfde633606647af47c465e7c1c44db5a84cc2dca2b0d0ba7e442d933004e7de64573dedc34867c4c2c83160fdb80a58d0f580e38f3cd96b215ea0d5795968fa1b15692f6a0cdc6e61138a22db6f5d1f93e", &(0x7f0000000740)=""/10, 0x6, 0xffffffffffffffff}, 0x28) close(r1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getpid() ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r1}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r1, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000280)={r4}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r1, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 118.397634] FAULT_INJECTION: forcing a failure. [ 118.397634] name failslab, interval 1, probability 0, space 0, times 0 [ 118.409051] CPU: 1 PID: 17127 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 118.416337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.425689] Call Trace: [ 118.428291] dump_stack+0x194/0x24d [ 118.431935] ? arch_local_irq_restore+0x53/0x53 [ 118.436607] ? __save_stack_trace+0x7e/0xd0 [ 118.440952] should_fail+0x8c0/0xa40 2018/03/29 23:44:12 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000005c0)='./file0\x00', r0}, 0x10) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000580)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000038c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000003a00)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000280)={r4}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) [ 118.444683] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 118.450053] ? kasan_kmalloc+0xad/0xe0 [ 118.453936] ? kmem_cache_alloc_trace+0x136/0x740 [ 118.458778] ? __memcg_init_list_lru_node+0x169/0x270 [ 118.463967] ? __list_lru_init+0x544/0x750 [ 118.468200] ? sget_userns+0x6b1/0xe40 [ 118.472093] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 118.476841] ? do_mount+0xea4/0x2bb0 [ 118.477496] 9pnet_virtio: no channels available for device ./file0/file0 [ 118.480541] ? SyS_mount+0xab/0x120 [ 118.480552] ? do_syscall_64+0x281/0x940 [ 118.480563] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 118.480588] ? find_held_lock+0x35/0x1d0 [ 118.480612] ? __lock_is_held+0xb6/0x140 [ 118.480644] ? check_same_owner+0x320/0x320 [ 118.511583] 9pnet_virtio: no channels available for device ./file0 [ 118.512829] ? rcu_note_context_switch+0x710/0x710 [ 118.512863] should_failslab+0xec/0x120 [ 118.512877] kmem_cache_alloc_trace+0x4b/0x740 [ 118.512889] ? __kmalloc_node+0x33/0x70 [ 118.512923] __memcg_init_list_lru_node+0x169/0x270 [ 118.512944] ? list_lru_add+0x7c0/0x7c0 2018/03/29 23:44:12 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x0, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:12 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0a", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 118.512955] ? __kmalloc_node+0x47/0x70 [ 118.512978] __list_lru_init+0x544/0x750 [ 118.553621] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 118.559513] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 118.564544] ? lockdep_init_map+0x9/0x10 [ 118.568613] sget_userns+0x6b1/0xe40 [ 118.572322] ? set_anon_super+0x20/0x20 [ 118.576316] ? put_filp+0x90/0x90 [ 118.579771] ? destroy_unused_super.part.6+0xd0/0xd0 [ 118.584874] ? alloc_vfsmnt+0x762/0x9c0 [ 118.588845] ? path_lookupat+0x238/0xba0 [ 118.592914] ? mnt_free_id.isra.21+0x50/0x50 [ 118.597329] ? trace_hardirqs_off+0x10/0x10 [ 118.601658] ? putname+0xee/0x130 [ 118.605113] ? cap_capable+0x1b5/0x230 [ 118.609011] ? security_capable+0x8e/0xc0 [ 118.613161] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 118.617120] 9pnet_virtio: no channels available for device ./file0/file0 [ 118.618339] ? ns_capable_common+0xcf/0x160 [ 118.618361] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 118.618371] mount_ns+0x6d/0x190 [ 118.618391] rpc_mount+0x9e/0xd0 [ 118.627723] 9pnet_virtio: no channels available for device ./file0 [ 118.629524] mount_fs+0x66/0x2d0 [ 118.629548] vfs_kern_mount.part.26+0xc6/0x4a0 [ 118.629566] ? may_umount+0xa0/0xa0 [ 118.629578] ? _raw_read_unlock+0x22/0x30 [ 118.629590] ? __get_fs_type+0x8a/0xc0 [ 118.629617] do_mount+0xea4/0x2bb0 [ 118.629626] ? __might_fault+0x110/0x1d0 [ 118.629651] ? copy_mount_string+0x40/0x40 [ 118.629662] ? check_same_owner+0x320/0x320 [ 118.629674] ? __check_object_size+0x8b/0x530 [ 118.687896] ? __might_sleep+0x95/0x190 [ 118.691887] ? kasan_check_write+0x14/0x20 [ 118.696119] ? _copy_from_user+0x99/0x110 [ 118.700278] ? memdup_user+0x5e/0x90 [ 118.703994] ? copy_mount_options+0x1f7/0x2e0 [ 118.708498] SyS_mount+0xab/0x120 [ 118.711952] ? copy_mnt_ns+0xb30/0xb30 [ 118.715846] do_syscall_64+0x281/0x940 [ 118.719736] ? __do_page_fault+0xc90/0xc90 [ 118.723963] ? _raw_spin_unlock_irq+0x27/0x70 [ 118.728460] ? finish_task_switch+0x1c1/0x7e0 [ 118.732954] ? syscall_return_slowpath+0x550/0x550 [ 118.733066] 9pnet_virtio: no channels available for device ./file0/file0 2018/03/29 23:44:13 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa4", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:13 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x0, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) [ 118.737875] ? syscall_return_slowpath+0x2ac/0x550 [ 118.737890] ? prepare_exit_to_usermode+0x350/0x350 [ 118.737906] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 118.737928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 118.737951] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 118.747822] 9pnet_virtio: no channels available for device ./file0 [ 118.749684] RIP: 0033:0x4548b9 [ 118.749690] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 118.749701] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 118.749707] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 118.749713] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 118.749718] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 118.749724] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 118.758488] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f00000005c0)={r1}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) socketpair(0xa, 0x2, 0x3, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000580)={r1, r3}) 2018/03/29 23:44:13 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:13 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000fa"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:13 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa4", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:13 executing program 6 (fault-call:12 fault-nth:28): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:13 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x0, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 118.945203] FAULT_INJECTION: forcing a failure. [ 118.945203] name failslab, interval 1, probability 0, space 0, times 0 [ 118.951867] 9pnet_virtio: no channels available for device ./file0/file0 [ 118.956516] CPU: 0 PID: 17206 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 118.970575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 118.979926] Call Trace: [ 118.982520] dump_stack+0x194/0x24d [ 118.986158] ? arch_local_irq_restore+0x53/0x53 [ 118.990828] ? __save_stack_trace+0x7e/0xd0 [ 118.995165] should_fail+0x8c0/0xa40 [ 118.995871] 9pnet_virtio: no channels available for device ./file0 [ 118.998880] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 118.998893] ? kasan_kmalloc+0xad/0xe0 [ 118.998901] ? kmem_cache_alloc_trace+0x136/0x740 [ 118.998912] ? __memcg_init_list_lru_node+0x169/0x270 [ 118.998920] ? __list_lru_init+0x544/0x750 [ 118.998929] ? sget_userns+0x6b1/0xe40 [ 118.998943] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 118.998952] ? do_mount+0xea4/0x2bb0 2018/03/29 23:44:13 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff07"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) socketpair(0x0, 0x7, 0x8, &(0x7f00000006c0)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000700)) socketpair(0x9, 0x1, 0x3, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000400)) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000280)={r4}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r0, 0x28, &(0x7f0000000580)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r5, 0x2, 0x18}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000640)={r5, 0x9, 0x8}, 0xc) [ 119.018818] 9pnet_virtio: no channels available for device ./file0 [ 119.019031] ? SyS_mount+0xab/0x120 [ 119.019042] ? do_syscall_64+0x281/0x940 [ 119.019051] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 119.019072] ? find_held_lock+0x35/0x1d0 [ 119.064101] ? __lock_is_held+0xb6/0x140 [ 119.068199] ? check_same_owner+0x320/0x320 [ 119.072524] ? rcu_note_context_switch+0x710/0x710 [ 119.077468] should_failslab+0xec/0x120 [ 119.081442] kmem_cache_alloc_trace+0x4b/0x740 [ 119.086024] ? __kmalloc_node+0x33/0x70 [ 119.089995] ? __kmalloc_node+0x33/0x70 [ 119.093965] ? rcu_read_lock_sched_held+0x108/0x120 [ 119.098979] __memcg_init_list_lru_node+0x169/0x270 [ 119.103988] ? list_lru_add+0x7c0/0x7c0 [ 119.107942] ? __kmalloc_node+0x47/0x70 [ 119.111902] __list_lru_init+0x544/0x750 [ 119.115950] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 119.121817] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 119.126822] ? lockdep_init_map+0x9/0x10 [ 119.130862] sget_userns+0x6b1/0xe40 [ 119.134552] ? set_anon_super+0x20/0x20 [ 119.138514] ? put_filp+0x90/0x90 [ 119.141945] ? destroy_unused_super.part.6+0xd0/0xd0 [ 119.147031] ? alloc_vfsmnt+0x762/0x9c0 [ 119.150984] ? path_lookupat+0x238/0xba0 [ 119.155029] ? mnt_free_id.isra.21+0x50/0x50 [ 119.159421] ? trace_hardirqs_off+0x10/0x10 [ 119.163730] ? putname+0xee/0x130 [ 119.167166] ? cap_capable+0x1b5/0x230 [ 119.171043] ? security_capable+0x8e/0xc0 [ 119.175170] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 119.180333] ? ns_capable_common+0xcf/0x160 [ 119.184637] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 119.189799] mount_ns+0x6d/0x190 [ 119.193149] rpc_mount+0x9e/0xd0 [ 119.196494] mount_fs+0x66/0x2d0 [ 119.199840] vfs_kern_mount.part.26+0xc6/0x4a0 [ 119.204400] ? may_umount+0xa0/0xa0 [ 119.208007] ? _raw_read_unlock+0x22/0x30 [ 119.212138] ? __get_fs_type+0x8a/0xc0 [ 119.216020] do_mount+0xea4/0x2bb0 [ 119.219535] ? __might_fault+0x110/0x1d0 [ 119.223580] ? copy_mount_string+0x40/0x40 [ 119.227790] ? check_same_owner+0x320/0x320 [ 119.232088] ? __check_object_size+0x8b/0x530 [ 119.236566] ? __might_sleep+0x95/0x190 [ 119.240524] ? kasan_check_write+0x14/0x20 [ 119.244735] ? _copy_from_user+0x99/0x110 [ 119.248865] ? memdup_user+0x5e/0x90 [ 119.252553] ? copy_mount_options+0x1f7/0x2e0 [ 119.257039] SyS_mount+0xab/0x120 [ 119.260469] ? copy_mnt_ns+0xb30/0xb30 [ 119.264337] do_syscall_64+0x281/0x940 [ 119.268200] ? __do_page_fault+0xc90/0xc90 [ 119.272408] ? _raw_spin_unlock_irq+0x27/0x70 [ 119.276877] ? finish_task_switch+0x1c1/0x7e0 [ 119.281347] ? syscall_return_slowpath+0x550/0x550 [ 119.286253] ? syscall_return_slowpath+0x2ac/0x550 [ 119.291160] ? prepare_exit_to_usermode+0x350/0x350 [ 119.296153] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 119.301500] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 119.306330] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 119.311493] RIP: 0033:0x4548b9 [ 119.314657] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 119.322343] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 119.329589] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 119.336835] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 23:44:13 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa4", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:13 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x0, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) [ 119.344080] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 119.351323] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c 2018/03/29 23:44:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) [ 119.453614] 9pnet_virtio: no channels available for device ./file0/file0 [ 119.464771] 9pnet_virtio: no channels available for device ./file0 2018/03/29 23:44:13 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff07"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:13 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x0, 0x1, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:13 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:13 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:13 executing program 6 (fault-call:12 fault-nth:29): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:13 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000580)={0xffffffffffffff9c}) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000880)={&(0x7f0000000600)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x0, 0x1, 0x0, {0xa, 0x4e22, 0x6, @loopback={0x0, 0x1}, 0x1}}}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000680)="8a5b44d12bd830144cddb799aeac695bf53a9bb013519a015f5b099a40794ebead42005dd56add3cc9eb6ef9d448c278c8a74b96ea3e9bac4345d4f495f1b15db3ab0f4a0d219d404994348fe2642f72c8c98e8e823099cc2986f47fdf533dbc4efbf03f1d289ec7ff0b2f85b2768af793d496425d285419b397527e89b9bbf9478904664c756577d2825560d8fd679b5adb607dc4575461a799f5bfc9c2e734ab52ca86", 0xa4}, {&(0x7f0000000740)="ef623229358f66880fe08fd7b2bc1466a2886bea1666e6ad380bbc0c57c5fe4f53434180e980b723d819e4cb44bb90fe5092a439d08cf3814f46a851f5c84727099984825e2d07d44b0a7a7ff78a7e2473cf3b109000a13244d8d27f8fc9107f1abada132a20ecc302c857bdab6f688943cb3203fca9e622cb864c677f260e0a78c8c9a230b1715c686974e41b9b83137d9219f0facc3bd438107d347716276045d20148738ee7776ad35def1e95670905dbe68eda6cce34cf3f411c3272cf9d649be7e78d78cb9d3dad713ca0331b9b0a575021fa50c0", 0xd7}], 0x2, 0x0, 0x0, 0xc000}, 0x4004094) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000008c0)=0x7, 0x4) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000280)={r4}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:13 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') [ 119.557236] FAULT_INJECTION: forcing a failure. [ 119.557236] name failslab, interval 1, probability 0, space 0, times 0 [ 119.568528] CPU: 1 PID: 17267 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 119.575797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 119.585136] Call Trace: [ 119.587709] dump_stack+0x194/0x24d [ 119.591321] ? arch_local_irq_restore+0x53/0x53 [ 119.595968] ? __save_stack_trace+0x7e/0xd0 [ 119.600287] should_fail+0x8c0/0xa40 [ 119.603987] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 119.609070] ? kasan_kmalloc+0xad/0xe0 [ 119.612931] ? kmem_cache_alloc_trace+0x136/0x740 [ 119.617747] ? __memcg_init_list_lru_node+0x169/0x270 [ 119.622911] ? __list_lru_init+0x544/0x750 [ 119.627117] ? sget_userns+0x6b1/0xe40 [ 119.630984] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 119.638494] ? do_mount+0xea4/0x2bb0 [ 119.642182] ? SyS_mount+0xab/0x120 [ 119.645793] ? do_syscall_64+0x281/0x940 [ 119.649827] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 119.655181] ? find_held_lock+0x35/0x1d0 [ 119.659229] ? __lock_is_held+0xb6/0x140 [ 119.663286] ? check_same_owner+0x320/0x320 [ 119.667595] ? rcu_note_context_switch+0x710/0x710 [ 119.672513] should_failslab+0xec/0x120 [ 119.676465] kmem_cache_alloc_trace+0x4b/0x740 [ 119.681041] ? __kmalloc_node+0x33/0x70 [ 119.684990] ? __kmalloc_node+0x33/0x70 [ 119.688944] ? rcu_read_lock_sched_held+0x108/0x120 [ 119.693945] __memcg_init_list_lru_node+0x169/0x270 [ 119.698943] ? list_lru_add+0x7c0/0x7c0 [ 119.702895] ? __kmalloc_node+0x47/0x70 [ 119.706855] __list_lru_init+0x544/0x750 [ 119.710901] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 119.716767] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 119.721773] ? lockdep_init_map+0x9/0x10 [ 119.725817] sget_userns+0x6b1/0xe40 [ 119.729509] ? set_anon_super+0x20/0x20 [ 119.733468] ? put_filp+0x90/0x90 [ 119.736898] ? destroy_unused_super.part.6+0xd0/0xd0 [ 119.741982] ? alloc_vfsmnt+0x762/0x9c0 [ 119.745935] ? path_lookupat+0x238/0xba0 [ 119.749973] ? mnt_free_id.isra.21+0x50/0x50 [ 119.754367] ? trace_hardirqs_off+0x10/0x10 [ 119.758672] ? putname+0xee/0x130 [ 119.762109] ? cap_capable+0x1b5/0x230 [ 119.765982] ? security_capable+0x8e/0xc0 [ 119.770114] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 119.775288] ? ns_capable_common+0xcf/0x160 [ 119.779602] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 119.784771] mount_ns+0x6d/0x190 [ 119.788122] rpc_mount+0x9e/0xd0 [ 119.791471] mount_fs+0x66/0x2d0 [ 119.794822] vfs_kern_mount.part.26+0xc6/0x4a0 [ 119.799384] ? may_umount+0xa0/0xa0 [ 119.802991] ? _raw_read_unlock+0x22/0x30 [ 119.807116] ? __get_fs_type+0x8a/0xc0 [ 119.810989] do_mount+0xea4/0x2bb0 [ 119.814504] ? __might_fault+0x110/0x1d0 [ 119.818550] ? copy_mount_string+0x40/0x40 [ 119.822763] ? check_same_owner+0x320/0x320 [ 119.827063] ? __check_object_size+0x8b/0x530 [ 119.831544] ? __might_sleep+0x95/0x190 [ 119.835505] ? kasan_check_write+0x14/0x20 [ 119.839714] ? _copy_from_user+0x99/0x110 [ 119.843847] ? memdup_user+0x5e/0x90 [ 119.847538] ? copy_mount_options+0x1f7/0x2e0 [ 119.852021] SyS_mount+0xab/0x120 [ 119.855457] ? copy_mnt_ns+0xb30/0xb30 [ 119.859323] do_syscall_64+0x281/0x940 [ 119.863184] ? __do_page_fault+0xc90/0xc90 [ 119.867395] ? finish_task_switch+0x1c1/0x7e0 [ 119.871886] ? syscall_return_slowpath+0x550/0x550 [ 119.876794] ? syscall_return_slowpath+0x2ac/0x550 [ 119.881704] ? prepare_exit_to_usermode+0x350/0x350 [ 119.886700] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 119.892051] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 119.896878] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 119.902045] RIP: 0033:0x4548b9 2018/03/29 23:44:14 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff07"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) [ 119.905209] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 119.912892] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 119.920140] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 119.927390] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 119.934635] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 119.941879] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/29 23:44:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffff9c, 0x50, &(0x7f0000000580)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000640)=r1, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:14 executing program 6 (fault-call:12 fault-nth:30): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 120.010463] 9pnet_virtio: no channels available for device ./file0/file0 [ 120.021451] 9pnet_virtio: no channels available for device ./file0 [ 120.025696] 9pnet_virtio: no channels available for device ./file0 [ 120.059560] FAULT_INJECTION: forcing a failure. [ 120.059560] name failslab, interval 1, probability 0, space 0, times 0 [ 120.071193] CPU: 0 PID: 17296 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 120.078468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.087819] Call Trace: [ 120.090409] dump_stack+0x194/0x24d [ 120.094048] ? arch_local_irq_restore+0x53/0x53 [ 120.098745] should_fail+0x8c0/0xa40 [ 120.102470] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 120.107576] ? trace_hardirqs_off+0x10/0x10 [ 120.111895] ? find_next_zero_bit+0xe3/0x110 [ 120.116311] ? perf_trace_lock+0xd6/0x900 [ 120.120462] ? trace_hardirqs_off+0x10/0x10 [ 120.124781] ? find_held_lock+0x35/0x1d0 [ 120.128846] ? __lock_is_held+0xb6/0x140 [ 120.132917] ? check_same_owner+0x320/0x320 [ 120.137217] ? lock_downgrade+0x980/0x980 [ 120.141349] ? rcu_note_context_switch+0x710/0x710 [ 120.146255] ? find_held_lock+0x35/0x1d0 [ 120.150301] should_failslab+0xec/0x120 [ 120.154250] __kmalloc+0x63/0x760 [ 120.157680] ? lock_downgrade+0x980/0x980 [ 120.161810] ? register_shrinker+0x10e/0x2d0 [ 120.166194] ? trace_event_raw_event_module_request+0x320/0x320 [ 120.172233] register_shrinker+0x10e/0x2d0 [ 120.176442] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 120.182219] ? memcpy+0x45/0x50 [ 120.185485] sget_userns+0xbbf/0xe40 [ 120.189171] ? set_anon_super+0x20/0x20 [ 120.193126] ? put_filp+0x90/0x90 [ 120.196558] ? destroy_unused_super.part.6+0xd0/0xd0 [ 120.201640] ? path_lookupat+0x238/0xba0 [ 120.206114] ? mnt_free_id.isra.21+0x50/0x50 [ 120.210504] ? trace_hardirqs_off+0x10/0x10 [ 120.214805] ? putname+0xee/0x130 [ 120.218238] ? cap_capable+0x1b5/0x230 [ 120.222108] ? security_capable+0x8e/0xc0 [ 120.226236] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 120.231401] ? ns_capable_common+0xcf/0x160 [ 120.235705] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 120.240869] mount_ns+0x6d/0x190 [ 120.244216] rpc_mount+0x9e/0xd0 [ 120.247561] mount_fs+0x66/0x2d0 [ 120.250910] vfs_kern_mount.part.26+0xc6/0x4a0 [ 120.255472] ? may_umount+0xa0/0xa0 [ 120.259078] ? _raw_read_unlock+0x22/0x30 [ 120.263201] ? __get_fs_type+0x8a/0xc0 [ 120.267074] do_mount+0xea4/0x2bb0 [ 120.270589] ? __might_fault+0x110/0x1d0 [ 120.274639] ? copy_mount_string+0x40/0x40 [ 120.278847] ? check_same_owner+0x320/0x320 [ 120.283145] ? __check_object_size+0x8b/0x530 [ 120.287627] ? __might_sleep+0x95/0x190 [ 120.291586] ? kasan_check_write+0x14/0x20 [ 120.295797] ? _copy_from_user+0x99/0x110 [ 120.299926] ? memdup_user+0x5e/0x90 [ 120.303618] ? copy_mount_options+0x1f7/0x2e0 [ 120.308095] SyS_mount+0xab/0x120 [ 120.311524] ? copy_mnt_ns+0xb30/0xb30 [ 120.315402] do_syscall_64+0x281/0x940 [ 120.319269] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 120.324785] ? syscall_return_slowpath+0x550/0x550 [ 120.329702] ? syscall_return_slowpath+0x2ac/0x550 [ 120.334622] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 120.339970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 120.344799] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 120.349963] RIP: 0033:0x4548b9 [ 120.353128] RSP: 002b:00007f124881ec68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 23:44:14 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0x1e9, &(0x7f0000000ac0)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x4, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r2, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:14 executing program 7: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='9p\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c794dae8e5b203e0aa407", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:14 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x80, 0xfff, 0x0, 0xffffffffffffffff, 0x0, [0x140]}, 0x2a) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000004c0)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0x50, &(0x7f0000000500)}, 0x10) recvmsg(r0, &(0x7f00000009c0)={&(0x7f0000000700)=@in6={0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000780)=""/225, 0xe1}, {&(0x7f0000000600)=""/31, 0x1f}], 0x2, &(0x7f00000008c0)=""/231, 0xe7, 0xfff}, 0x2000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x55, 0xc0, &(0x7f0000000080)="6cf65da6b99269a69b43a8a246ccf89b33d5eb14067ede3a947a5b5b6347ce3f57072bcc0a4d4454b9159155bd09f28a400f9cfb0dc2f05b9229532276cea0e559d155791691c3beb98cd0f43153dd0c657c0b296c", &(0x7f0000000180)=""/192, 0x86, 0x8c0}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r2, 0x50, &(0x7f00000003c0)={0x0, 0x0}}, 0x10) socket$kcm(0x29, 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000a00)}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r3, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)) r4 = perf_event_open(&(0x7f0000000680)={0x5, 0x70, 0x7, 0x9, 0x9, 0x18cc, 0x0, 0x7f, 0x20000, 0x8, 0xfffffffffffffffa, 0x0, 0x101, 0x1, 0x8, 0x3, 0x7f, 0x100, 0x3, 0x3, 0x8, 0x8001, 0x0, 0x5, 0x8000, 0x8, 0x1, 0x4, 0x9, 0x14c01751, 0x2, 0x2, 0x73c5, 0x3f, 0x6, 0x7ff, 0x5eb7dc78, 0x100, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x3}, 0x10049, 0x400, 0x3f, 0x6, 0xa7, 0x3, 0xdb}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000100)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x8000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x50, &(0x7f0000000280)}, 0x10) 2018/03/29 23:44:14 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x4, 0x4, 0x8db, 0x0, 0xffffffffffffffff, 0x0, [0x115]}, 0x274) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00', r0}, 0xfed4) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x49, 0x5e, &(0x7f0000000100)="c9d11f4fd6437892d956e3e9275a6916d1ead6f0228ddcd99b72c3232c255dd7a3275508cdaadf3d1a47c6ab9c7fef1ff55faa6d84eda1ffa891f7c7495286d1905bf742bbfe67eeb4", &(0x7f0000000180)=""/94, 0x8, 0x4}, 0x28) socketpair(0x16, 0x800, 0x4, &(0x7f0000000580)={0xffffffffffffffff}) recvmsg$kcm(r1, &(0x7f0000001780)={&(0x7f00000005c0)=@pppol2tpv3in6, 0x80, &(0x7f0000000740)=[{&(0x7f0000000640)=""/133, 0x85}, {&(0x7f0000000700)=""/11, 0xb}], 0x2, &(0x7f0000000780)=""/4096, 0x1000, 0x8f7}, 0x20) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000240)={r0}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r0, &(0x7f0000000440)="6a3113a8acef5a56fdd51eb4516605099b56d3ae354998eb91b36d02d906048ba210c955dffe287081905e98eb31abb302a6a51c6ab8151444f1de33c60ea25885076fc429301f570deb6e4914efacd13cf3a46c324470974907f7cce0f43d2ac684b5efaf4065ac31420e9afe954de9623990a1cd927cf492f1a16b2a97b9eba0f6605ac6dc2d5ae2e270281266eb4ea756c77ef8ada111f114e745c3d091c3dbfd3568658c3cfaaae096365fb42cd24efdd9d7fef0c0873588a03417e1e7e85f91eb94d1371ce2df1f2bb86a06f4f1ace04fe7cfc033a2a1bea3e8b252476a4ea0a9b8143722"}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000280)={r3}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r0, &(0x7f00000002c0)="f8df9006da1f6c1a00a62dc87307bb92febf3f083fcae24969234955e0f7933c2e8192f15316f179644a390b3ab8e9cd33e527a3cb6c6ee0cdc16957ee88138596f229f0d7961e9689cc65ad817ab4337829dcf905f1ee360511b441f632b1b407606daa7718e40bbc9821645a0f00c8507694b58be0cc4da9a8dc8af58f0f1a114cde77444999baafabe72475978c69e59c5fd2e5fd", &(0x7f0000000380)=""/73}, 0x18) 2018/03/29 23:44:14 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff07001710"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") 2018/03/29 23:44:14 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg(r0, &(0x7f0000002400)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000022c0)=[{&(0x7f0000000080)=""/116, 0x74}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/253, 0xfd}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000002200)=""/173, 0xad}], 0x5, &(0x7f0000002340)=""/144, 0x90, 0x20ac}, 0x40010140) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002480)={&(0x7f0000002440)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002500)={r2, 0x28, &(0x7f00000024c0)={0x0, 0x0}}, 0x10) socketpair(0x8, 0x0, 0x7, &(0x7f0000002540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000002580)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002700)={r5, &(0x7f00000025c0)="5e16ad67f8e7a3546ef48e420167be4487f0a385fea02da6731d187493e806e38e87818237d803bb0288039291efc166cd6c589014bc62c2bb0e18c58d47bdb849914cb1d95f14abbde498f9d79c7afead98c9b17500b56520418ea754f9608246387c047bf145404140b28af9c042743b0fe6f184256f529799a9fbdfdadb03c17c52d2571cc79e8b054acdd80ddf1e912ba79c28f31b54f1618e32416c400b8ebe", &(0x7f0000002680)=""/101}, 0x18) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000002780)={&(0x7f0000002740)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(r6, &(0x7f0000010080)={&(0x7f000000fc80)=@hci={0x0, 0x0}, 0x80, &(0x7f000000ff40)=[{&(0x7f000000fd00)=""/108, 0x6c}, {&(0x7f000000fd80)=""/189, 0xbd}, {&(0x7f000000fe40)=""/236, 0xec}], 0x3, &(0x7f000000ff80)=""/236, 0xec, 0x3}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000100c0)={0xf, 0xe, &(0x7f00000027c0)=@raw=[@ldst={0x3, 0x3, 0x3, 0xf, 0xc2c35d57e686908e, 0xfffffff0}, @alu={0x7, 0x40, 0xc, 0xb, 0x3, 0x50, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @alu={0x7, 0x1, 0x6, 0xa, 0x9, 0xfffffffe, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x16}, @call={0x85, 0x0, 0x0, 0x1f}, @map={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f0000002840)='GPL\x00', 0x7f, 0x2f, &(0x7f0000002880)=""/47, 0x41100, 0x0, [], r8}, 0x48) recvmsg$kcm(r1, &(0x7f00000102c0)={&(0x7f0000010140)=@alg, 0x80, &(0x7f0000010280)=[{&(0x7f00000101c0)=""/167, 0xa7}], 0x1, 0x0, 0x0, 0xea2}, 0x2000) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x3f) recvmsg$kcm(r0, &(0x7f00000108c0)={&(0x7f0000010300)=@nl=@unspec, 0x80, &(0x7f0000010800)=[{&(0x7f0000010380)=""/164, 0xa4}, {&(0x7f0000010440)=""/226, 0xe2}, {&(0x7f0000010540)=""/7, 0x7}, {&(0x7f0000010580)=""/79, 0x4f}, {&(0x7f0000010600)=""/196, 0xc4}, {&(0x7f0000010700)=""/253, 0xfd}], 0x6, &(0x7f0000010880)=""/53, 0x35, 0x4865}, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010a00)={r2, &(0x7f0000010900)="20f984c6ea9db9ba34eff65459bab0e64b1e0957038604ab1c195ce37d9a8a7e7d7eec4260a0475d80424a657508d7aa8ada6dd0382e9f2a1f08604407b2e34c7ea7b26a5564b40a4c13a8891a24320dd5563f8e7154861b85e7bc3a59bca1c37bc285855e83", &(0x7f0000010980)=""/123}, 0x18) socketpair(0xe, 0xa, 0x3, &(0x7f0000010a40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000010a80)) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000010ac0)={r3, 0x401, 0x18}, 0xc) socketpair$ax25(0x3, 0x5, 0xcf, &(0x7f0000010b00)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000010b40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000010b80)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x1, 0x7, &(0x7f0000010bc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r9, 0xc008240a, &(0x7f0000010c00)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvmsg(r13, &(0x7f0000012f00)={&(0x7f0000010c40)=@can, 0x80, &(0x7f0000011ec0)=[{&(0x7f0000010cc0)=""/4096, 0x1000}, {&(0x7f0000011cc0)=""/91, 0x5b}, {&(0x7f0000011d40)=""/67, 0x43}, {&(0x7f0000011dc0)=""/233, 0xe9}], 0x4, &(0x7f0000011f00)=""/4096, 0x1000, 0x5}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000013040)={r11, &(0x7f0000012f40)="9145f296e94a03a2ffc47b343eb052291a4fa5758ec72e8385f748874dc519ea388283f1b9f04361911b73fd7c642e318ad86a3f2a6b6e77e14cb9fa38afb28259f2c82d77f90fb915dc0149a2d9c9a0e44e9fdc5aa178f0ec", &(0x7f0000012fc0)=""/74}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000131c0)={r10, 0x0, 0x1, 0xd0, &(0x7f0000013080)='O', &(0x7f00000130c0)=""/208, 0x200, 0x3}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000013280)={r7, 0x50, &(0x7f0000013200)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000132c0)=r14, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000013400)={0xf, 0x9, &(0x7f0000013300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, [@map={0x18, 0xb, 0x1, 0x0, r12}, @initr0={0x18, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x1}, @jmp={0x5, 0x2, 0xf, 0x1, 0xb, 0xffffffc0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000013380)='syzkaller\x00', 0x6, 0x15, &(0x7f00000133c0)=""/21, 0x41100, 0x1}, 0x48) mkdir(&(0x7f0000013480)='./file1\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r7) 2018/03/29 23:44:14 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f0000000180)="2d26f2e3b0eb68a858b49254645003d305") ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000000c0)={r1}) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000003c0)) mount(&(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='cgroup2\x00', 0xc0, &(0x7f00000002c0)="83757e53a6d6d6368c682ac46a09c9de0a052142635281ed8f2a3fbb23c05f8393aef0e5b163879d2bbd03d5d51c5f84b9e6ee71") mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x8) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='afs\x00', 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3df}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000c72000)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r2, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000440), 0x0, &(0x7f0000005100)=""/93, 0x5d}, 0x0) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="e9", 0x1}], 0x1, &(0x7f0000000180)}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) recvmsg(r2, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/229, 0xe5}, {&(0x7f0000000180)=""/15, 0xf}, {&(0x7f0000001480)=""/99, 0x63}, {&(0x7f0000001500)=""/133, 0x85}], 0x5, &(0x7f0000001640)=""/208, 0xd0, 0x3ff}, 0x10000) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r1, &(0x7f00000001c0)="6297f59bb8c9f63963ca1a2df7bf1d95aac5b4d44f6c3861989ce01495d2ba793d6c69d98c824d58fec231078ed2b903f929177d08a6329c33f6555d8f59b5bd5adae6ba980cdb75e5511489dd496e5debba75137eba91690548f3555fd54e359270d97bd97c42565b74e4347d71c7abc8c10571d10b04f3e629820dc45092c674ccb6a21c0855c547194be10dcfd9ec4382e1fa73ec6c", &(0x7f0000000680)=""/4096}, 0x18) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000640)='selinuxfs\x00', 0x0, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x8000) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)="2d26f2e3b0eb68a858b49254645003d305") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001700)={0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700), 0x3}, 0x20) mount(&(0x7f00006f9ff8)='./file1\x00', &(0x7f0000145ffe)='..', &(0x7f0000000000), 0x0, 0x0) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='selinuxfs\x00') 2018/03/29 23:44:14 executing program 6 (fault-call:12 fault-nth:31): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="180003910020000000faffffffff070017100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(r1, &(0x7f0000000380)={&(0x7f0000000c00)=@ax25={0x3, {"02f47b3723e03d"}}, 0xfffffe7c, &(0x7f0000000200), 0x0, &(0x7f0000000040)=ANY=[], 0x0, 0x24004046}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='fuse\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000400)={r1, r3}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") [ 120.360810] RAX: ffffffffffffffda RBX: 00007f124881f6d4 RCX: 00000000004548b9 [ 120.368056] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 120.375301] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 120.382545] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 120.389788] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e [ 120.437678] ------------[ cut here ]------------ [ 120.442628] refcount_t: increment on 0; use-after-free. [ 120.448161] WARNING: CPU: 1 PID: 12436 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 120.455947] Kernel panic - not syncing: panic_on_warn set ... [ 120.455947] [ 120.463291] CPU: 1 PID: 12436 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #41 [ 120.470541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 120.480047] Call Trace: [ 120.482619] dump_stack+0x194/0x24d [ 120.486232] ? arch_local_irq_restore+0x53/0x53 [ 120.490888] ? vsnprintf+0x1ed/0x1900 [ 120.494689] panic+0x1e4/0x41c [ 120.497865] ? refcount_error_report+0x214/0x214 [ 120.502597] ? show_regs_print_info+0x18/0x18 [ 120.507090] ? __warn+0x1c1/0x200 [ 120.510534] ? refcount_inc+0x47/0x50 [ 120.514310] __warn+0x1dc/0x200 [ 120.517573] ? refcount_inc+0x47/0x50 [ 120.521373] report_bug+0x1f4/0x2b0 [ 120.524991] fixup_bug.part.11+0x37/0x80 [ 120.529039] do_error_trap+0x2d7/0x3e0 [ 120.532905] ? vprintk_default+0x28/0x30 [ 120.536950] ? math_error+0x400/0x400 [ 120.540755] ? printk+0xaa/0xca [ 120.544018] ? show_regs_print_info+0x18/0x18 [ 120.548516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 120.553352] do_invalid_op+0x1b/0x20 [ 120.557044] invalid_op+0x1b/0x40 [ 120.560472] RIP: 0010:refcount_inc+0x47/0x50 [ 120.564853] RSP: 0018:ffff8801d8467860 EFLAGS: 00010286 [ 120.570195] RAX: dffffc0000000008 RBX: ffff8801af7c00c4 RCX: ffffffff815ba4be [ 120.577444] RDX: 0000000000000000 RSI: 1ffff1003b08cebc RDI: 1ffff1003b08ce91 [ 120.584692] RBP: ffff8801d8467868 R08: 0000000000000000 R09: 0000000000000000 [ 120.591941] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801d8467af8 [ 120.599187] R13: ffff8801b2ba6013 R14: ffff8801af7c00c0 R15: ffff8801b2ba6001 [ 120.606455] ? vprintk_func+0x5e/0xc0 [ 120.610251] sk_alloc+0x3f9/0x1440 [ 120.613788] ? sock_def_error_report+0x5e0/0x5e0 [ 120.618519] ? __raw_spin_lock_init+0x2d/0x100 [ 120.623090] ? trace_hardirqs_off+0x10/0x10 [ 120.627388] ? do_raw_write_unlock+0x290/0x290 [ 120.631956] ? trace_hardirqs_off+0x10/0x10 [ 120.636253] ? __raw_spin_lock_init+0x1c/0x100 [ 120.640820] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 120.645825] ? find_held_lock+0x35/0x1d0 [ 120.649881] ? inet_create+0x3fc/0xf50 [ 120.653750] ? lock_downgrade+0x980/0x980 [ 120.657884] ? lock_release+0xa40/0xa40 [ 120.661837] ? lock_downgrade+0x980/0x980 [ 120.665999] inet_create+0x47c/0xf50 [ 120.669712] ? ipip_gro_receive+0xf0/0xf0 [ 120.673845] ? __lock_is_held+0xb6/0x140 [ 120.677921] __sock_create+0x4d4/0x850 [ 120.681801] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 120.686725] ? user_path_create+0x40/0x40 [ 120.690868] SyS_socket+0xeb/0x1d0 [ 120.694382] ? fillonedir+0x250/0x250 [ 120.698166] ? move_addr_to_kernel+0x60/0x60 [ 120.702551] ? getname_flags+0x256/0x580 [ 120.706589] ? do_syscall_64+0xb7/0x940 [ 120.710551] ? move_addr_to_kernel+0x60/0x60 [ 120.714941] do_syscall_64+0x281/0x940 [ 120.718807] ? __do_page_fault+0xc90/0xc90 [ 120.723028] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 120.728548] ? syscall_return_slowpath+0x550/0x550 [ 120.733457] ? syscall_return_slowpath+0x2ac/0x550 [ 120.738375] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 120.743728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 120.748568] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 120.753735] RIP: 0033:0x4573e7 [ 120.756900] RSP: 002b:00007ffdf6c42408 EFLAGS: 00000206 ORIG_RAX: 0000000000000029 [ 120.764590] RAX: ffffffffffffffda RBX: 00000000000000d9 RCX: 00000000004573e7 [ 120.771836] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 120.779083] RBP: 00007ffdf6c42ab0 R08: 0000000000000000 R09: 0000000000000001 [ 120.786330] R10: 0000000000000006 R11: 0000000000000206 R12: 0000000000000237 [ 120.793577] R13: 0000000000000237 R14: 0000000000000012 R15: 000000000001d4ea [ 120.801514] Dumping ftrace buffer: [ 120.805115] (ftrace buffer empty) [ 120.808800] Kernel Offset: disabled [ 120.812407] Rebooting in 86400 seconds..