[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 17.501105] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.786428] random: sshd: uninitialized urandom read (32 bytes read) [ 22.041326] random: sshd: uninitialized urandom read (32 bytes read) [ 22.915443] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.47' (ECDSA) to the list of known hosts. [ 28.435295] random: sshd: uninitialized urandom read (32 bytes read) 2018/05/28 12:05:11 fuzzer started 2018/05/28 12:05:12 dialing manager at 10.128.0.26:38059 [ 52.030166] can: request_module (can-proto-0) failed. [ 52.040284] can: request_module (can-proto-0) failed. 2018/05/28 12:05:36 kcov=true, comps=true 2018/05/28 12:05:36 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0xc0045878, &(0x7f0000000180)) 2018/05/28 12:05:36 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:36 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:36 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:36 executing program 5: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)="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") 2018/05/28 12:05:36 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)="84", 0x1}], 0x1, &(0x7f0000000440)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 2018/05/28 12:05:36 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) [ 53.730637] IPVS: ftp: loaded support on port[0] = 21 [ 53.752234] IPVS: ftp: loaded support on port[0] = 21 [ 53.804296] IPVS: ftp: loaded support on port[0] = 21 [ 53.817275] IPVS: ftp: loaded support on port[0] = 21 [ 53.828981] IPVS: ftp: loaded support on port[0] = 21 [ 53.848382] IPVS: ftp: loaded support on port[0] = 21 [ 53.860934] IPVS: ftp: loaded support on port[0] = 21 [ 53.862358] IPVS: ftp: loaded support on port[0] = 21 [ 55.100976] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.107547] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.151458] device bridge_slave_0 entered promiscuous mode [ 55.162374] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.168812] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.176363] device bridge_slave_0 entered promiscuous mode [ 55.186155] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.192562] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.200910] device bridge_slave_0 entered promiscuous mode [ 55.211527] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.217930] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.234760] device bridge_slave_0 entered promiscuous mode [ 55.243558] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.250010] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.257356] device bridge_slave_0 entered promiscuous mode [ 55.266521] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.273069] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.284805] device bridge_slave_0 entered promiscuous mode [ 55.294051] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.300463] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.317689] device bridge_slave_0 entered promiscuous mode [ 55.326937] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.333529] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.341415] device bridge_slave_1 entered promiscuous mode [ 55.350505] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.356993] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.364726] device bridge_slave_1 entered promiscuous mode [ 55.371628] bridge0: port 1(bridge_slave_0) entered blocking state [ 55.378084] bridge0: port 1(bridge_slave_0) entered disabled state [ 55.390508] device bridge_slave_0 entered promiscuous mode [ 55.400055] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.406511] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.418066] device bridge_slave_1 entered promiscuous mode [ 55.426886] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.433382] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.444596] device bridge_slave_1 entered promiscuous mode [ 55.451778] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.458257] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.468224] device bridge_slave_1 entered promiscuous mode [ 55.477992] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.484420] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.492302] device bridge_slave_1 entered promiscuous mode [ 55.500928] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.508005] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.514433] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.542308] device bridge_slave_1 entered promiscuous mode [ 55.552463] bridge0: port 2(bridge_slave_1) entered blocking state [ 55.558914] bridge0: port 2(bridge_slave_1) entered disabled state [ 55.569359] device bridge_slave_1 entered promiscuous mode [ 55.577747] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.587739] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.595507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.604289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.614177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.623047] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.632610] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.671135] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 55.709418] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.724040] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.732832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.742128] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.765835] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.774370] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 55.833743] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 56.046647] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.080488] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.147912] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.159935] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.175367] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.186707] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.212519] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.225540] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.236136] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.286510] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 56.302712] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.322441] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.335588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.345664] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.360143] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.452177] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 56.513727] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.520976] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.578862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.585934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.605159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.612815] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 56.620613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.631692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 56.668834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.677686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.684932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.713466] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.721764] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.748638] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.770150] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 56.802993] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 56.917856] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 56.926972] team0: Port device team_slave_0 added [ 56.947476] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 56.969722] team0: Port device team_slave_0 added [ 57.031462] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.055797] team0: Port device team_slave_0 added [ 57.074594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.083126] team0: Port device team_slave_0 added [ 57.094822] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.109716] team0: Port device team_slave_1 added [ 57.118625] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.131734] team0: Port device team_slave_1 added [ 57.143339] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.152893] team0: Port device team_slave_0 added [ 57.161916] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.171367] team0: Port device team_slave_0 added [ 57.182213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.205737] team0: Port device team_slave_0 added [ 57.216876] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.227317] team0: Port device team_slave_1 added [ 57.249171] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.266062] team0: Port device team_slave_1 added [ 57.283921] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.302996] team0: Port device team_slave_1 added [ 57.313179] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.322268] team0: Port device team_slave_1 added [ 57.329726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.341502] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.363396] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.370937] team0: Port device team_slave_1 added [ 57.385605] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 57.394797] team0: Port device team_slave_0 added [ 57.409311] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.434910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.457888] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.479008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.507455] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.521948] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.530710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.541700] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.550922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.560725] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 57.568829] team0: Port device team_slave_1 added [ 57.579944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.591210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.599448] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.614691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.634471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.658776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.672479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.680686] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.688341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.696167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.705927] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.712880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.721587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.731874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.740918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 57.749759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.758490] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.767097] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 57.777120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.784929] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 57.798834] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 57.806739] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.840223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.873175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 57.898806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 57.906414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.914429] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.922417] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.930548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.938272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 57.946521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 57.954261] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.962271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 57.970175] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 57.978010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 57.985894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 57.993791] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.006665] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.015724] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.024782] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.035197] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.044340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 58.052396] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.063923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.098505] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.121629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.131570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.139743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.147977] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.156543] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.166436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 58.175244] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 58.185471] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.201769] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.211901] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 58.232276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.246153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.283482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.299813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.310701] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 58.318627] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 58.357345] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.371292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.392920] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 58.426290] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 58.438866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 58.467062] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 59.438621] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.445420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.452715] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.459127] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.493582] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.502441] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.508884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.515558] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.521965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.536049] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.550686] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.568738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 59.684438] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.691167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.698345] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.704966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.713415] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.732844] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.739321] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.746211] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.752723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.769799] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.779344] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.785886] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.793535] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.800068] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.840789] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.862408] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.869352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.876087] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.882894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.913843] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 59.925227] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.931897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 59.939538] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.946206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 59.988213] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.008139] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.014582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 60.021273] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.027689] bridge0: port 1(bridge_slave_0) entered forwarding state [ 60.041201] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 60.575255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.590276] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.610533] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.626246] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.633694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 60.641723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.705419] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.744492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.870877] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.882395] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.899795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.036160] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.165938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.182551] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.212705] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.256546] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.303765] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.313311] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.440784] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.573522] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.632573] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.638862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.649628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.672911] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.714846] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.724102] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.730335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.741565] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.798851] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.805897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.819284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.835998] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.847476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.862278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.988943] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.995239] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.005580] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.035196] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.048517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.063588] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.174358] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.218844] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.226275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.243094] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.273746] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.280777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.295736] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.323310] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.346655] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.388197] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.474526] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.538010] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.750117] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.780070] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/28 12:05:52 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) 2018/05/28 12:05:52 executing program 5: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)="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") 2018/05/28 12:05:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:52 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:53 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0xc0045878, &(0x7f0000000180)) 2018/05/28 12:05:53 executing program 5: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)="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") 2018/05/28 12:05:53 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) 2018/05/28 12:05:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:53 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:53 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:53 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)="84", 0x1}], 0x1, &(0x7f0000000440)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 2018/05/28 12:05:53 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) [ 70.384984] syz-executor4 (6436) used greatest stack depth: 13576 bytes left 2018/05/28 12:05:53 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:54 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:54 executing program 5: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)="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") 2018/05/28 12:05:54 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) 2018/05/28 12:05:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0xc0045878, &(0x7f0000000180)) 2018/05/28 12:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)="84", 0x1}], 0x1, &(0x7f0000000440)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 2018/05/28 12:05:54 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0xc0045878, &(0x7f0000000180)) 2018/05/28 12:05:54 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:54 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:55 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 7: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:55 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x4}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000340)="84", 0x1}], 0x1, &(0x7f0000000440)}, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x7, &(0x7f0000000080), 0x4) 2018/05/28 12:05:55 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:55 executing program 6: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x894c, &(0x7f0000000100)={r1}) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0xb701, 0xffffffffffffffff) close(r2) 2018/05/28 12:05:55 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:55 executing program 7: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:55 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:55 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:55 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:55 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x17, 0x8000000006, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f00000000c0)}, 0x10) 2018/05/28 12:05:56 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 7: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:56 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:56 executing program 1: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) 2018/05/28 12:05:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:56 executing program 7: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000001300)=""/146, 0x92}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="101301000017"], 0x6}, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000140)=ANY=[]) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) socket$kcm(0x29, 0x7, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = socket$kcm(0xa, 0x200000003, 0x11) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x890c, &(0x7f00000013c0)) 2018/05/28 12:05:56 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000000)=r0, 0x4) 2018/05/28 12:05:56 executing program 6: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x40000000000003, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000000)) 2018/05/28 12:05:56 executing program 1: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, &(0x7f00000000c0)=')') 2018/05/28 12:05:56 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) 2018/05/28 12:05:56 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000000)=r0, 0x4) 2018/05/28 12:05:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:56 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:56 executing program 1: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, &(0x7f00000000c0)=')') 2018/05/28 12:05:56 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:56 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000000)=r0, 0x4) 2018/05/28 12:05:56 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:56 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='nfsd\x00', 0x13f00, &(0x7f0000000140)) 2018/05/28 12:05:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:57 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:57 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x8, &(0x7f0000000000)=r0, 0x4) 2018/05/28 12:05:57 executing program 1: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, &(0x7f00000000c0)=')') 2018/05/28 12:05:57 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:57 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:57 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:57 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:57 executing program 1: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='debugfs\x00', 0x0, &(0x7f00000000c0)=')') 2018/05/28 12:05:57 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:57 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x7, 0xd986, 0x3, 0x12}, 0x2c) 2018/05/28 12:05:57 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x5, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="18000000ffea000000000000000000009500000000000000"], &(0x7f00000001c0)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f0000000080)=""/251}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340)=r1, 0x4) 2018/05/28 12:05:57 executing program 5: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180), 0x2c) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x13f) 2018/05/28 12:05:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x7, 0xd986, 0x3, 0x12}, 0x2c) 2018/05/28 12:05:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/.ile0\x00', 0x0) 2018/05/28 12:05:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0ee545cf000000000000006f388000006a0a00fffffff6005d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x20000428, 0x0, 0x1085}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/05/28 12:05:57 executing program 6: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="8d", 0x1}, {&(0x7f00000002c0)="d41ab152e100dd", 0x7}], 0x2, &(0x7f0000001880)}, 0x0) 2018/05/28 12:05:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0ee545cf000000000000006f388000006a0a00fffffff6005d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x20000428, 0x0, 0x1085}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/05/28 12:05:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x7, 0xd986, 0x3, 0x12}, 0x2c) 2018/05/28 12:05:57 executing program 0: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5450, &(0x7f00000000c0)='%d') 2018/05/28 12:05:57 executing program 6: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="8d", 0x1}, {&(0x7f00000002c0)="d41ab152e100dd", 0x7}], 0x2, &(0x7f0000001880)}, 0x0) 2018/05/28 12:05:57 executing program 4: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/05/28 12:05:57 executing program 5: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:57 executing program 7: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xa, 0x7, 0xd986, 0x3, 0x12}, 0x2c) 2018/05/28 12:05:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0ee545cf000000000000006f388000006a0a00fffffff6005d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x20000428, 0x0, 0x1085}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/05/28 12:05:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:57 executing program 0: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5450, &(0x7f00000000c0)='%d') 2018/05/28 12:05:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0ee545cf000000000000006f388000006a0a00fffffff6005d"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x8, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x20000428, 0x0, 0x1085}], {0x95}}, &(0x7f00000004c0)="73797a6b584e3e2f9afed6d0ee3d5d5de2f791e4545b69c564e359a02949ab535c1b25caa665b968d2f1a32e3febe4189befa5f044722bae83e5b6959e392e8d24e41b4ce153c97b5a23e135e38d3b1d14ad7a9eeb7069347fee053569544f1a0000000000000000", 0x80000001, 0x466, &(0x7f0000000300)=""/187}, 0x48) 2018/05/28 12:05:57 executing program 7: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:57 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/05/28 12:05:57 executing program 6: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="8d", 0x1}, {&(0x7f00000002c0)="d41ab152e100dd", 0x7}], 0x2, &(0x7f0000001880)}, 0x0) 2018/05/28 12:05:57 executing program 4: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:57 executing program 0: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5450, &(0x7f00000000c0)='%d') 2018/05/28 12:05:57 executing program 5: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:58 executing program 1: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 6: r0 = socket$kcm(0xa, 0x3, 0x3a) sendmsg$kcm(r0, &(0x7f0000001c40)={&(0x7f0000000140)=@un=@abs, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="8d", 0x1}, {&(0x7f00000002c0)="d41ab152e100dd", 0x7}], 0x2, &(0x7f0000001880)}, 0x0) 2018/05/28 12:05:58 executing program 4: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/05/28 12:05:58 executing program 7: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:58 executing program 0: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5450, &(0x7f00000000c0)='%d') 2018/05/28 12:05:58 executing program 5: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 1: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 4: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:58 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 2018/05/28 12:05:58 executing program 1: mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)="2e2466696c6530f6ff00", &(0x7f00000000c0)='efs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)="2e2466696c6530f6ff", 0x0) 2018/05/28 12:05:58 executing program 7: mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, &(0x7f00000007c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000ec0)='./file0/file0\x00', 0x0) mount(&(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='./file0/file0\x00', &(0x7f0000000140)='vxfs\x00', 0x3080, &(0x7f0000000080)) mount(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)="6265090005af2c29daf0f7eab4babdfc0516796b77d7be1b76b6ea9d13a05b33874fc6ceb0324814f7", 0x84000, 0x0) 2018/05/28 12:05:58 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000001c00)={&(0x7f0000001500)=@in6={0xa, 0x0, 0x8, @local={0xfe, 0x80, [], 0xaa}}, 0x314, &(0x7f0000001800), 0x0, &(0x7f0000000100)}, 0x0) 2018/05/28 12:05:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:58 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:58 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:58 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000001c00)={&(0x7f0000001500)=@in6={0xa, 0x0, 0x8, @local={0xfe, 0x80, [], 0xaa}}, 0x314, &(0x7f0000001800), 0x0, &(0x7f0000000100)}, 0x0) 2018/05/28 12:05:58 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:58 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:58 executing program 6: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000002ac0)={0x7, 0x3, &(0x7f0000001440)=@framed={{0x18}, [], {0x95}}, &(0x7f0000001480)='syzkaller\x00', 0x3, 0x1000, &(0x7f00000014c0)=""/4096}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) close(r0) 2018/05/28 12:05:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:58 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000001c00)={&(0x7f0000001500)=@in6={0xa, 0x0, 0x8, @local={0xfe, 0x80, [], 0xaa}}, 0x314, &(0x7f0000001800), 0x0, &(0x7f0000000100)}, 0x0) 2018/05/28 12:05:58 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:58 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:58 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 5: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000001c00)={&(0x7f0000001500)=@in6={0xa, 0x0, 0x8, @local={0xfe, 0x80, [], 0xaa}}, 0x314, &(0x7f0000001800), 0x0, &(0x7f0000000100)}, 0x0) 2018/05/28 12:05:59 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890c, &(0x7f0000000040)={r0}) 2018/05/28 12:05:59 executing program 7: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfffffffffffffdf2) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 2018/05/28 12:05:59 executing program 3: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='hfsplus\x00', 0x0, &(0x7f0000000100)) 2018/05/28 12:05:59 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x0, 0x7f, 0x8, 0xc, 0xffffffffffffffff, 0x5}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x4, 0x11, 0x1934, 0x0, 0xffffffffffffffff, 0xd742, [0x305f]}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x0, 0x3, 0xfff, 0x10, r0, 0xfffffffffffffffd}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x11, 0x6, 0xffffffff, 0x1, 0xffffffffffffffff, 0x100000001}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r1, &(0x7f0000000100)="a37615532c00c6373d1a0dee87fe000442385a7d686b7ed431e5105b429d4ac25a20b8d0573d5c7c356f2df5da1f6cf027088669ee238af15fa3c9a459c70592d460befb36ea3061613b39c90d3cd91ab4db9d62312dfe40d40d615610d4c3e6ac839d398faeec7eebc7660739a6ebd45bfa46584350e20ea13b229b099bde05f1597ea8370a04450630e4402886c8d71408e063e31a66d857b5dc77", &(0x7f00000001c0)=""/19}, 0x18) 2018/05/28 12:05:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890c, &(0x7f0000000040)={r0}) 2018/05/28 12:05:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:59 executing program 3: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='hfsplus\x00', 0x0, &(0x7f0000000100)) 2018/05/28 12:05:59 executing program 7: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfffffffffffffdf2) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 2018/05/28 12:05:59 executing program 6: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:59 executing program 3: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='hfsplus\x00', 0x0, &(0x7f0000000100)) 2018/05/28 12:05:59 executing program 1: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000040)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r0}, 0x10) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000300)='rpc_pipefs\x00', 0x0, &(0x7f0000000340)) 2018/05/28 12:05:59 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x4, &(0x7f0000000180), 0x1) 2018/05/28 12:05:59 executing program 7: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 6: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890c, &(0x7f0000000040)={r0}) 2018/05/28 12:05:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfffffffffffffdf2) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 2018/05/28 12:05:59 executing program 6: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfffffffffffffdf2) r0 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)) 2018/05/28 12:05:59 executing program 7: socketpair$inet(0x1e, 0x2, 0x0, &(0x7f0000000080)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@alg, 0x80, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/2, 0x2}], 0x1, &(0x7f0000000240)=""/253, 0xfd}, 0x40) 2018/05/28 12:05:59 executing program 0: r0 = socket$kcm(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x890c, &(0x7f0000000040)={r0}) 2018/05/28 12:05:59 executing program 3: mkdir(&(0x7f0000001000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='hfsplus\x00', 0x0, &(0x7f0000000100)) 2018/05/28 12:05:59 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/28 12:05:59 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff9c, 0x0, 0x0, 0x0, 0x7, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:59 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/05/28 12:05:59 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:05:59 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:05:59 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x25}, [], {0x95}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:05:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) 2018/05/28 12:05:59 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) [ 76.864494] rpcbind: RPC call returned error 22 [ 76.890760] rpcbind: RPC call returned error 22 2018/05/28 12:06:00 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 7: socket$kcm(0x29, 0x5, 0xfeffffff) 2018/05/28 12:06:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/05/28 12:06:00 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x25}, [], {0x95}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:06:00 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/28 12:06:00 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:06:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) 2018/05/28 12:06:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) [ 77.082277] rpcbind: RPC call returned error 22 2018/05/28 12:06:00 executing program 7: socket$kcm(0x29, 0x5, 0xfeffffff) 2018/05/28 12:06:00 executing program 5: r0 = getpid() perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x0, 0x8}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/28 12:06:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) 2018/05/28 12:06:00 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:06:00 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x25}, [], {0x95}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:06:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/05/28 12:06:00 executing program 7: socket$kcm(0x29, 0x5, 0xfeffffff) [ 77.290939] rpcbind: RPC call returned error 22 2018/05/28 12:06:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) 2018/05/28 12:06:00 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x25}, [], {0x95}}, &(0x7f0000000000)="504c20004cf7d12af11ce92537b5e3191e66de5d4ec18e4c2df01484a86d77842f624946eae310794c8c96ff1466232e25951139bda5d2990e523f8ec3080ffc1224d8dc4c84a9c8e8ab31576806715523fa749e8615c61049b8b1be6aa7740702cc5add", 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) 2018/05/28 12:06:00 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:06:00 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) 2018/05/28 12:06:00 executing program 7: socket$kcm(0x29, 0x5, 0xfeffffff) 2018/05/28 12:06:00 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 77.442788] rpcbind: RPC call returned error 22 2018/05/28 12:06:00 executing program 6: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:06:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7}, 0x2c) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x9cffffff, 0x201a7fd7, 0xa, 0x0, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x25, &(0x7f0000000040)="a2d0d1cf66743a308d53ef0a619d", &(0x7f0000000100)=""/37}, 0x28) 2018/05/28 12:06:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/05/28 12:06:00 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000002a80)={&(0x7f0000000300)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x2, [], 0x1}, 0xc}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)}, 0x0) 2018/05/28 12:06:00 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) [ 77.614654] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 77.633513] rpcbind: RPC call returned error 22 2018/05/28 12:06:00 executing program 5: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 6: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/05/28 12:06:00 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000002a80)={&(0x7f0000000300)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x2, [], 0x1}, 0xc}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)}, 0x0) 2018/05/28 12:06:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xe}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)}, 0x10) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) 2018/05/28 12:06:00 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, &(0x7f0000001640), 0x22) 2018/05/28 12:06:00 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:06:00 executing program 7: r0 = socket$kcm(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0x4, &(0x7f0000000000), 0x72) [ 77.763453] rpcbind: RPC call returned error 22 2018/05/28 12:06:00 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x70, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040)="d1", &(0x7f00000001c0)=""/141}, 0x18) 2018/05/28 12:06:00 executing program 0: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000240)='./file0/bus\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0/bus\x00', &(0x7f0000000400)='sysfs\x00', 0x0, &(0x7f0000000480)) mkdir(&(0x7f0000000000)='./file0/bus\x00', 0x0) 2018/05/28 12:06:00 executing program 7: r0 = socket$kcm(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0x4, &(0x7f0000000000), 0x72) 2018/05/28 12:06:00 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, &(0x7f0000001640), 0x22) 2018/05/28 12:06:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xe}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)}, 0x10) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) 2018/05/28 12:06:00 executing program 6: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) close(r0) 2018/05/28 12:06:00 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000002a80)={&(0x7f0000000300)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x2, [], 0x1}, 0xc}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)}, 0x0) 2018/05/28 12:06:00 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) 2018/05/28 12:06:01 executing program 7: r0 = socket$kcm(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0x4, &(0x7f0000000000), 0x72) 2018/05/28 12:06:01 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x3, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f0000000040), 0x1}, 0x20) [ 77.987716] rpcbind: RPC call returned error 22 2018/05/28 12:06:01 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x70, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040)="d1", &(0x7f00000001c0)=""/141}, 0x18) 2018/05/28 12:06:01 executing program 0: r0 = getpid() perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000200)=""/19, 0x13}, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/05/28 12:06:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xe}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)}, 0x10) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) 2018/05/28 12:06:01 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, &(0x7f0000001640), 0x22) 2018/05/28 12:06:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8981, &(0x7f0000000040)) 2018/05/28 12:06:01 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000002a80)={&(0x7f0000000300)=@in6={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x2, [], 0x1}, 0xc}, 0x80, &(0x7f00000018c0), 0x0, &(0x7f0000001980)}, 0x0) 2018/05/28 12:06:01 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000ed1000)={0x3, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f0000000040), 0x1}, 0x20) 2018/05/28 12:06:01 executing program 7: r0 = socket$kcm(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x10e, 0x4, &(0x7f0000000000), 0x72) 2018/05/28 12:06:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0xe}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000080)}, 0x10) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x14, &(0x7f0000000080), 0x301) 2018/05/28 12:06:01 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) socket$kcm(0xa, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x4, 0x4, 0x70, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000040)="d1", &(0x7f00000001c0)=""/141}, 0x18) 2018/05/28 12:06:01 executing program 1: r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x13, &(0x7f0000001640), 0x22) 2018/05/28 12:06:01 executing program 7: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x15, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 78.274138] [ 78.275919] ====================================================== [ 78.282228] WARNING: possible circular locking dependency detected [ 78.288542] 4.17.0-rc6+ #25 Not tainted [ 78.292508] ------------------------------------------------------ [ 78.298823] kworker/1:0/18 is trying to acquire lock: [ 78.303993] (ptrval) (clock-AF_INET6){++..}, at: sock_hash_free+0x377/0x700 [ 78.311897] [ 78.311897] but task is already holding lock: [ 78.317848] (ptrval) (&htab->buckets[i].lock#2){+...}, at: sock_hash_free+0x1d4/0x700 [ 78.326594] [ 78.326594] which lock already depends on the new lock. [ 78.326594] [ 78.334989] [ 78.334989] the existing dependency chain (in reverse order) is: [ 78.342596] [ 78.342596] -> #1 (&htab->buckets[i].lock#2){+...}: [ 78.349296] _raw_spin_lock_bh+0x31/0x40 [ 78.354258] bpf_tcp_close+0x822/0x10b0 [ 78.358734] inet_release+0x104/0x1f0 [ 78.363042] inet6_release+0x50/0x70 [ 78.367268] sock_release+0x96/0x1b0 [ 78.371503] sock_close+0x16/0x20 [ 78.375460] __fput+0x34d/0x890 [ 78.379244] ____fput+0x15/0x20 [ 78.383029] task_work_run+0x1e4/0x290 [ 78.387429] do_exit+0x1aee/0x2730 [ 78.391483] do_group_exit+0x16f/0x430 [ 78.395881] get_signal+0x886/0x1960 [ 78.400104] do_signal+0x98/0x2040 [ 78.404156] exit_to_usermode_loop+0x28a/0x310 [ 78.409351] do_syscall_64+0x6ac/0x800 [ 78.413740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 78.419440] [ 78.419440] -> #0 (clock-AF_INET6){++..}: [ 78.425057] lock_acquire+0x1dc/0x520 [ 78.429381] _raw_write_lock_bh+0x31/0x40 [ 78.434034] sock_hash_free+0x377/0x700 [ 78.438598] bpf_map_free_deferred+0xba/0xf0 [ 78.443686] process_one_work+0xc1e/0x1b50 [ 78.448426] worker_thread+0x1cc/0x1440 [ 78.452903] kthread+0x345/0x410 [ 78.456782] ret_from_fork+0x3a/0x50 [ 78.461011] [ 78.461011] other info that might help us debug this: [ 78.461011] [ 78.469136] Possible unsafe locking scenario: [ 78.469136] [ 78.475174] CPU0 CPU1 [ 78.479914] ---- ---- [ 78.484568] lock(&htab->buckets[i].lock#2); [ 78.489333] lock(clock-AF_INET6); [ 78.495459] lock(&htab->buckets[i].lock#2); [ 78.502461] lock(clock-AF_INET6); [ 78.506075] [ 78.506075] *** DEADLOCK *** [ 78.506075] [ 78.512228] 4 locks held by kworker/1:0/18: [ 78.516524] #0: (ptrval) ((wq_completion)"events"){+.+.}, at: process_one_work+0xaef/0x1b50 [ 78.525791] #1: (ptrval) ((work_completion)(&map->work)){+.+.}, at: process_one_work+0xb46/0x1b50 [ 78.535671] #2: (ptrval) (rcu_read_lock){....}, at: sock_hash_free+0x0/0x700 [ 78.543644] #3: (ptrval) (&htab->buckets[i].lock#2){+...}, at: sock_hash_free+0x1d4/0x700 [ 78.552737] [ 78.552737] stack backtrace: [ 78.557222] CPU: 1 PID: 18 Comm: kworker/1:0 Not tainted 4.17.0-rc6+ #25 [ 78.564057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 78.573406] Workqueue: events bpf_map_free_deferred [ 78.578403] Call Trace: [ 78.580989] dump_stack+0x1b9/0x294 [ 78.584615] ? dump_stack_print_info.cold.2+0x52/0x52 [ 78.589806] ? print_lock+0xd1/0xd6 [ 78.593433] ? vprintk_func+0x81/0xe7 [ 78.597220] print_circular_bug.isra.36.cold.54+0x1bd/0x27d [ 78.602925] ? save_trace+0xe0/0x290 [ 78.606623] __lock_acquire+0x343e/0x5140 [ 78.610753] ? __lock_acquire+0x7f5/0x5140 [ 78.614985] ? debug_check_no_locks_freed+0x310/0x310 [ 78.620162] ? debug_check_no_locks_freed+0x310/0x310 [ 78.625341] ? mark_held_locks+0xc9/0x160 [ 78.629472] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 78.634078] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 78.639344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 78.644343] ? trace_hardirqs_on+0xd/0x10 [ 78.648476] ? __free_object+0x16e/0x330 [ 78.652526] ? __list_del_entry_valid.cold.1+0x58/0x58 [ 78.657794] ? mark_held_locks+0xc9/0x160 [ 78.661941] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 78.667658] ? _raw_spin_unlock_irqrestore+0x74/0xc0 [ 78.672755] ? graph_lock+0x170/0x170 [ 78.676544] ? debug_object_free+0x326/0x5f0 [ 78.680953] ? lockdep_init_map+0x9/0x10 [ 78.684998] ? graph_lock+0x170/0x170 [ 78.688808] lock_acquire+0x1dc/0x520 [ 78.692593] ? sock_hash_free+0x377/0x700 [ 78.696735] ? lock_downgrade+0x8e0/0x8e0 [ 78.700868] ? lock_release+0xa10/0xa10 [ 78.704826] ? mark_held_locks+0xc9/0x160 [ 78.708963] ? kasan_check_read+0x11/0x20 [ 78.713271] ? __local_bh_enable_ip+0x161/0x230 [ 78.717938] ? kasan_check_write+0x14/0x20 [ 78.722332] ? do_raw_spin_lock+0xc1/0x200 [ 78.726646] _raw_write_lock_bh+0x31/0x40 [ 78.730794] ? sock_hash_free+0x377/0x700 [ 78.734929] sock_hash_free+0x377/0x700 [ 78.738900] ? bpf_tcp_sendmsg+0x16f0/0x16f0 [ 78.743406] ? find_user+0x120/0x120 [ 78.747103] ? __lock_is_held+0xb5/0x140 [ 78.751153] bpf_map_free_deferred+0xba/0xf0 [ 78.755547] process_one_work+0xc1e/0x1b50 [ 78.759767] ? finish_task_switch+0x28b/0x840 [ 78.764366] ? pwq_dec_nr_in_flight+0x490/0x490 [ 78.769543] ? __schedule+0x809/0x1e30 [ 78.773420] ? graph_lock+0x170/0x170 [ 78.777283] ? lock_downgrade+0x8e0/0x8e0 [ 78.781444] ? find_held_lock+0x36/0x1c0 [ 78.785504] ? lock_acquire+0x1dc/0x520 [ 78.789465] ? worker_thread+0x41f/0x1440 [ 78.793594] ? lock_downgrade+0x8e0/0x8e0 [ 78.798051] ? lock_release+0xa10/0xa10 [ 78.803063] ? kasan_check_read+0x11/0x20 [ 78.807372] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 78.811942] worker_thread+0x1cc/0x1440 [ 78.815905] ? process_one_work+0x1b50/0x1b50 [ 78.820408] ? graph_lock+0x170/0x170 [ 78.825000] ? find_held_lock+0x36/0x1c0 [ 78.829154] ? find_held_lock+0x36/0x1c0 [ 78.833228] ? schedule+0xef/0x430 [ 78.836843] ? __schedule+0x1e30/0x1e30 [ 78.840806] ? do_raw_spin_unlock+0x9e/0x2e0 [ 78.845202] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 78.850036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 78.855578] ? __kthread_parkme+0x111/0x1d0 [ 78.859978] ? parse_args.cold.15+0x1b3/0x1b3 [ 78.864474] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 78.869479] ? trace_hardirqs_on+0xd/0x10 [ 78.873613] kthread+0x345/0x410 [ 78.876976] ? process_one_work+0x1b50/0x1b50 [ 78.881455] ? kthread_bind+0x40/0x40 [ 78.885242] ret_from_fork+0x3a/0x50