path+0x2ac/0x550 [ 476.437022] ? prepare_exit_to_usermode+0x350/0x350 [ 476.442027] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 476.447383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 476.452222] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 476.457400] RIP: 0033:0x454e79 [ 476.460573] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 476.468271] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 476.475526] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 476.482774] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 476.490033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 476.497281] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/31 08:51:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='aufs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000f80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000c40)={r2, &(0x7f0000000cc0)="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", &(0x7f0000000dc0)=""/245}, 0x18) mount(&(0x7f0000000c80)='./file0/bus\x00', &(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)='gfs2\x00', 0x0, &(0x7f0000000fc0)="f6f8534b4a27de39d4e3da37e1eb8a206d369edf841ba9fc1dae324cd069744298ed95f83cbaa67e38ad4aa64661766046968a3a0d099929a53e1d92c90e42e0cc1e1fcecd623f28ef0f3bb2f322f0ae0df66d8ca94a14ced0a0edb23cedde0824cfcc93c2dc7a3a2dbbc2d9c6049df8aa42d0432bb37f0d707145bc32d88f322a7d6b25b369bf0b33f29ab116a197ae2ccfa2d1378b3e53cfb101a383d4965c38afda79176b04dea1a1fe52c5afbb51a1083032a3a9f2346de2400282ed39c5220a28f69e8e67095017c5b7fd6ba4d4afb7c02ea0634eab36c58103ba") mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 476.529107] tmpfs: No value for mount option 'rpc_pipefs' [ 476.558293] autofs4:pid:13936:autofs4_fill_super: called with bogus options 2018/03/31 08:51:06 executing program 7 (fault-call:5 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:06 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x0, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:06 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3e") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:06 executing program 2: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x7, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000001d00)={&(0x7f0000000740)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000000c80)=[{&(0x7f00000007c0)=""/95, 0x5f}, {&(0x7f0000000840)=""/197, 0xc5}, {&(0x7f0000000940)=""/92, 0x5c}, {&(0x7f00000009c0)=""/220, 0xdc}, {&(0x7f0000000ac0)=""/22, 0x16}, {&(0x7f0000000b00)=""/238, 0xee}, {&(0x7f0000000c00)=""/87, 0x57}], 0x7, &(0x7f0000000d00)=""/4096, 0x1000, 0xfaae}, 0x2000) r6 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) recvmsg(r4, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001d40)=""/223, 0xdf}], 0x1, &(0x7f0000001e80)=""/2, 0x2, 0x1f}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000580)) [ 476.692919] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/03/31 08:51:06 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:06 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file1\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 476.767722] autofs4:pid:13965:autofs4_fill_super: called with bogus options [ 476.792115] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 476.836304] autofs4:pid:13965:autofs4_fill_super: called with bogus options [ 476.874244] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 476.895976] FAULT_INJECTION: forcing a failure. [ 476.895976] name failslab, interval 1, probability 0, space 0, times 0 [ 476.907325] CPU: 1 PID: 13986 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 476.914598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 476.923951] Call Trace: [ 476.926546] dump_stack+0x194/0x24d [ 476.930182] ? arch_local_irq_restore+0x53/0x53 [ 476.934857] should_fail+0x8c0/0xa40 [ 476.938572] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 476.943668] ? find_next_zero_bit+0xe3/0x110 [ 476.948067] ? trace_hardirqs_off+0x10/0x10 [ 476.952391] ? __lock_is_held+0xb6/0x140 [ 476.956489] ? find_held_lock+0x35/0x1d0 [ 476.960554] ? __lock_is_held+0xb6/0x140 [ 476.964621] ? check_same_owner+0x320/0x320 [ 476.968943] ? rcu_note_context_switch+0x710/0x710 [ 476.973873] ? rcu_note_context_switch+0x710/0x710 [ 476.978812] should_failslab+0xec/0x120 [ 476.982792] __kmalloc+0x63/0x760 [ 476.986247] ? lockdep_init_map+0x9/0x10 [ 476.990306] ? debug_mutex_init+0x2d/0x60 [ 476.994459] ? __list_lru_init+0xcf/0x750 [ 476.998611] __list_lru_init+0xcf/0x750 [ 477.002590] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 477.008482] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 477.013504] ? __lockdep_init_map+0xe4/0x650 [ 477.017931] ? lockdep_init_map+0x9/0x10 [ 477.021998] sget_userns+0x691/0xe40 [ 477.025711] ? set_anon_super+0x20/0x20 [ 477.029683] ? put_filp+0x90/0x90 [ 477.033135] ? destroy_unused_super.part.6+0xd0/0xd0 [ 477.038243] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 477.043263] ? trace_hardirqs_off+0x10/0x10 [ 477.047591] ? mark_held_locks+0xaf/0x100 [ 477.051738] ? cap_capable+0x1b5/0x230 [ 477.055633] ? security_capable+0x8e/0xc0 [ 477.059801] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 477.064982] ? ns_capable_common+0xcf/0x160 [ 477.069286] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 477.074537] mount_ns+0x6d/0x190 [ 477.077889] rpc_mount+0x9e/0xd0 [ 477.081232] mount_fs+0x66/0x2d0 [ 477.084574] vfs_kern_mount.part.26+0xc6/0x4a0 [ 477.089141] ? may_umount+0xa0/0xa0 [ 477.092751] ? _raw_read_unlock+0x22/0x30 [ 477.096889] ? __get_fs_type+0x8a/0xc0 [ 477.100761] do_mount+0xea4/0x2bb0 [ 477.104289] ? copy_mount_string+0x40/0x40 [ 477.108512] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 477.113512] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 477.118251] ? retint_kernel+0x10/0x10 [ 477.122124] ? copy_mount_options+0x18b/0x2e0 [ 477.126605] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 477.131428] ? copy_mount_options+0x1f7/0x2e0 [ 477.136261] SyS_mount+0xab/0x120 [ 477.139690] ? copy_mnt_ns+0xb30/0xb30 [ 477.143553] do_syscall_64+0x281/0x940 [ 477.147416] ? vmalloc_sync_all+0x30/0x30 [ 477.151541] ? _raw_spin_unlock_irq+0x27/0x70 [ 477.156033] ? finish_task_switch+0x1c1/0x7e0 [ 477.160521] ? syscall_return_slowpath+0x550/0x550 [ 477.165438] ? syscall_return_slowpath+0x2ac/0x550 [ 477.170359] ? prepare_exit_to_usermode+0x350/0x350 [ 477.175356] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 477.180697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.185517] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.190686] RIP: 0033:0x454e79 [ 477.193854] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 477.201536] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 477.208790] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 477.216044] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 477.223297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 477.230546] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 477.258163] tmpfs: No value for mount option 'rpc_pipefs' [ 477.272422] autofs4:pid:13986:autofs4_fill_super: called with bogus options 2018/03/31 08:51:07 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x19, 0x3, 0x8, &(0x7f0000000c40)) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:07 executing program 0: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)={0xb, 0x0, 0x3, 0x7fffffff, 0x1, 0x1, 0x9}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x201, 0x7fff, 0x100000043, 0x3, r2}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r3, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x100000001) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r6}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000cc0)='./file1\x00', 0x8) recvmsg(r1, &(0x7f0000000b80)={&(0x7f0000000980)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000a80)=[{&(0x7f0000000a00)=""/88, 0x58}], 0x1, &(0x7f0000000ac0)=""/169, 0xa9, 0x5}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x4, 0xb, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000}, [@generic={0x0, 0x8, 0x5, 0x81}, @call={0x85, 0x0, 0x0, 0x11}, @exit={0x95}, @call={0x85, 0x0, 0x0, 0x31}], {0x95}}, &(0x7f0000000840)='GPL\x00', 0x0, 0xf0, &(0x7f0000000880)=""/240, 0x40f00, 0x1, [], r8}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r7, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r9}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000680)=r7, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)={0xffffffffffffffff}) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000740)=r6, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r3, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x28}, 0x10) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:07 executing program 7 (fault-call:5 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:07 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:07 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x10028c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x9, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000780)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x2, &(0x7f0000000300)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000840)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000800)={&(0x7f0000000280)='./file0/file0/file0\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000740)={r1, &(0x7f00000008c0)="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", &(0x7f0000000880)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0xffffffffffffff1a) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) mkdir(&(0x7f00000001c0)='./file1\x00', 0xb0e1809268397583) 2018/03/31 08:51:07 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3e") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:07 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:07 executing program 2: r0 = gettid() gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) mount(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='./file0/file0/file0\x00', &(0x7f00000007c0)='pipefs\x00', 0x0, &(0x7f0000000800)="c79ce36473b8549bc178e63d272c181de63bbae50f310c91d54f67422d4d0eba36f84e6a5c65b262f6ee546576b86f98b1863e0fb8fed461d3899ad29d33a9117097049a164468faafe1688c5b1d16dfeaa3b9fa41965e1543fd8c422f36b5dfd7757390c443199a363c9c7380d5a932f051d446c325ad5a53394c443c62200438734c2f97433a4d76b22c69bfe32ac89be5b0727ad153be528561fb9bbdbf4f2c2d498c0a2ef7c1df84ef7fea259363aff759ef6d5d258180887853b8f96e02e603a451") r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000006c0)='./file1\x00', 0x8088) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x7e, 0x6, 0x1, 0x1, 0xffffffffffffffff, 0x7ff}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) mount(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x20, 0x0) socketpair$inet(0x2, 0x1, 0xffffffffffffff24, &(0x7f00000009c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 477.517295] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 477.530572] FAULT_INJECTION: forcing a failure. [ 477.530572] name failslab, interval 1, probability 0, space 0, times 0 [ 477.531222] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 477.541846] CPU: 0 PID: 14037 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 477.541852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.541856] Call Trace: [ 477.541873] dump_stack+0x194/0x24d [ 477.541886] ? arch_local_irq_restore+0x53/0x53 [ 477.557704] tmpfs: No value for mount option 'rpc_pipefs' [ 477.559966] ? __save_stack_trace+0x7e/0xd0 [ 477.559985] should_fail+0x8c0/0xa40 [ 477.559997] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 477.560010] ? kasan_kmalloc+0xad/0xe0 [ 477.560020] ? kmem_cache_alloc_trace+0x136/0x740 [ 477.560031] ? __memcg_init_list_lru_node+0x169/0x270 [ 477.560038] ? __list_lru_init+0x544/0x750 [ 477.560046] ? sget_userns+0x691/0xe40 [ 477.560057] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 477.570796] autofs4:pid:14038:autofs4_fill_super: called with bogus options [ 477.571961] ? do_mount+0xea4/0x2bb0 [ 477.571969] ? SyS_mount+0xab/0x120 [ 477.571980] ? do_syscall_64+0x281/0x940 [ 477.571991] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.572006] ? find_held_lock+0x35/0x1d0 [ 477.572018] ? __lock_is_held+0xb6/0x140 [ 477.572035] ? check_same_owner+0x320/0x320 [ 477.572047] ? rcu_note_context_switch+0x710/0x710 [ 477.666934] should_failslab+0xec/0x120 [ 477.670887] kmem_cache_alloc_trace+0x4b/0x740 [ 477.675443] ? __kmalloc_node+0x33/0x70 [ 477.679395] ? __kmalloc_node+0x33/0x70 [ 477.683351] ? rcu_read_lock_sched_held+0x108/0x120 [ 477.688348] __memcg_init_list_lru_node+0x169/0x270 [ 477.693346] ? list_lru_add+0x7c0/0x7c0 [ 477.697299] ? __kmalloc_node+0x47/0x70 [ 477.701268] __list_lru_init+0x544/0x750 [ 477.705319] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 477.711188] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 477.716188] ? __lockdep_init_map+0xe4/0x650 [ 477.720575] ? lockdep_init_map+0x9/0x10 [ 477.724626] sget_userns+0x691/0xe40 [ 477.728320] ? set_anon_super+0x20/0x20 [ 477.732280] ? put_filp+0x90/0x90 [ 477.735719] ? destroy_unused_super.part.6+0xd0/0xd0 [ 477.740812] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 477.745812] ? trace_hardirqs_off+0x10/0x10 [ 477.750199] ? putname+0xee/0x130 [ 477.753655] ? cap_capable+0x1b5/0x230 [ 477.757526] ? security_capable+0x8e/0xc0 [ 477.761657] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 477.766833] ? ns_capable_common+0xcf/0x160 [ 477.771139] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 477.776312] mount_ns+0x6d/0x190 [ 477.779656] rpc_mount+0x9e/0xd0 [ 477.782999] mount_fs+0x66/0x2d0 [ 477.786348] vfs_kern_mount.part.26+0xc6/0x4a0 [ 477.790904] ? may_umount+0xa0/0xa0 [ 477.794510] ? _raw_read_unlock+0x22/0x30 [ 477.798634] ? __get_fs_type+0x8a/0xc0 [ 477.802499] do_mount+0xea4/0x2bb0 [ 477.806023] ? copy_mount_string+0x40/0x40 [ 477.810242] ? rcu_pm_notify+0xc0/0xc0 [ 477.814110] ? copy_mount_options+0x5f/0x2e0 [ 477.818491] ? rcu_read_lock_sched_held+0x108/0x120 [ 477.823491] ? kmem_cache_alloc_trace+0x459/0x740 [ 477.828317] ? kasan_check_write+0x14/0x20 [ 477.832538] ? _copy_from_user+0x99/0x110 [ 477.836670] ? copy_mount_options+0x1f7/0x2e0 [ 477.841160] SyS_mount+0xab/0x120 [ 477.844594] ? copy_mnt_ns+0xb30/0xb30 [ 477.848463] do_syscall_64+0x281/0x940 [ 477.852328] ? vmalloc_sync_all+0x30/0x30 [ 477.856460] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 477.861980] ? syscall_return_slowpath+0x550/0x550 [ 477.866883] ? syscall_return_slowpath+0x2ac/0x550 [ 477.871803] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 477.877150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.881972] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 477.887144] RIP: 0033:0x454e79 [ 477.890311] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 477.897994] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 477.905329] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 477.912591] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 477.919839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 477.927093] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 477.938875] tmpfs: No value for mount option 'rpc_pipefs' [ 477.945993] autofs4:pid:14037:autofs4_fill_super: called with bogus options 2018/03/31 08:51:07 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mount(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='nilfs2\x00', 0x1002000, &(0x7f0000000d00)="4214b2688e5f900cd16c56de033dbe6e76272a87a0281b6dd8fdbd2641ecfae207b07a700afa415066b2abd71bf0dd6574ebf74b026b924395dc8d123db27b2968e373ae579226") mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:07 executing program 7 (fault-call:5 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 477.958678] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 477.974158] tmpfs: No value for mount option 'rpc_pipefs' [ 477.981471] autofs4:pid:14038:autofs4_fill_super: called with bogus options 2018/03/31 08:51:07 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp, 0x8000000200000000, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:08 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:08 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) [ 478.307246] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 478.326115] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 478.344376] FAULT_INJECTION: forcing a failure. [ 478.344376] name failslab, interval 1, probability 0, space 0, times 0 [ 478.355780] CPU: 1 PID: 14080 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 478.363054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.372043] tmpfs: No value for mount option 'rpc_pipefs' [ 478.372400] Call Trace: [ 478.372417] dump_stack+0x194/0x24d [ 478.372431] ? arch_local_irq_restore+0x53/0x53 [ 478.372451] should_fail+0x8c0/0xa40 [ 478.372463] ? is_bpf_text_address+0xa4/0x120 [ 478.388855] autofs4:pid:14082:autofs4_fill_super: called with bogus options [ 478.388900] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 478.388914] ? __kernel_text_address+0xd/0x40 [ 478.411994] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 478.413733] ? unwind_get_return_address+0x61/0xa0 [ 478.413762] ? find_held_lock+0x35/0x1d0 [ 478.413778] ? __lock_is_held+0xb6/0x140 [ 478.413798] ? check_same_owner+0x320/0x320 [ 478.413811] ? rcu_note_context_switch+0x710/0x710 [ 478.428609] tmpfs: No value for mount option 'rpc_pipefs' [ 478.429566] should_failslab+0xec/0x120 [ 478.429579] kmem_cache_alloc_trace+0x4b/0x740 [ 478.429588] ? __kmalloc_node+0x33/0x70 [ 478.429597] ? __kmalloc_node+0x33/0x70 [ 478.429607] ? rcu_read_lock_sched_held+0x108/0x120 [ 478.429622] __memcg_init_list_lru_node+0x169/0x270 [ 478.429633] ? list_lru_add+0x7c0/0x7c0 [ 478.429642] ? __kmalloc_node+0x47/0x70 [ 478.429656] __list_lru_init+0x544/0x750 [ 478.429669] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 478.429681] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 478.429691] ? __lockdep_init_map+0xe4/0x650 [ 478.429702] ? lockdep_init_map+0x9/0x10 [ 478.429714] sget_userns+0x691/0xe40 [ 478.429724] ? set_anon_super+0x20/0x20 [ 478.439608] autofs4:pid:14082:autofs4_fill_super: called with bogus options [ 478.442113] ? put_filp+0x90/0x90 [ 478.442126] ? destroy_unused_super.part.6+0xd0/0xd0 [ 478.442140] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 478.442154] ? trace_hardirqs_off+0x10/0x10 [ 478.442167] ? putname+0xee/0x130 [ 478.442180] ? cap_capable+0x1b5/0x230 [ 478.442193] ? security_capable+0x8e/0xc0 [ 478.554187] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 478.559356] ? ns_capable_common+0xcf/0x160 [ 478.563658] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 478.568825] mount_ns+0x6d/0x190 [ 478.572178] rpc_mount+0x9e/0xd0 [ 478.575522] mount_fs+0x66/0x2d0 [ 478.578884] vfs_kern_mount.part.26+0xc6/0x4a0 [ 478.583456] ? may_umount+0xa0/0xa0 [ 478.587066] ? _raw_read_unlock+0x22/0x30 [ 478.591189] ? __get_fs_type+0x8a/0xc0 [ 478.595052] do_mount+0xea4/0x2bb0 [ 478.598573] ? copy_mount_string+0x40/0x40 [ 478.602785] ? rcu_pm_notify+0xc0/0xc0 [ 478.606651] ? copy_mount_options+0x5f/0x2e0 [ 478.611040] ? rcu_read_lock_sched_held+0x108/0x120 [ 478.616039] ? kmem_cache_alloc_trace+0x459/0x740 [ 478.620858] ? kasan_check_write+0x14/0x20 [ 478.625071] ? copy_mount_options+0x1f7/0x2e0 [ 478.629549] SyS_mount+0xab/0x120 [ 478.632986] ? copy_mnt_ns+0xb30/0xb30 [ 478.636852] do_syscall_64+0x281/0x940 [ 478.640714] ? vmalloc_sync_all+0x30/0x30 [ 478.644841] ? _raw_spin_unlock_irq+0x27/0x70 [ 478.649319] ? finish_task_switch+0x1c1/0x7e0 [ 478.653808] ? syscall_return_slowpath+0x550/0x550 [ 478.658721] ? syscall_return_slowpath+0x2ac/0x550 [ 478.663629] ? prepare_exit_to_usermode+0x350/0x350 [ 478.668621] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 478.673959] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.678787] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 478.683958] RIP: 0033:0x454e79 [ 478.687121] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 478.694802] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 2018/03/31 08:51:08 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3e") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:08 executing program 1: mkdir(&(0x7f0000000d00)='./file1\x00', 0x30) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000bc0)={r0, 0x28, &(0x7f0000000b80)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c00)={r1, 0x57b, 0x8}, 0xc) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000c40)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r2, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x18084a, &(0x7f0000000d40)="9e7f368787c3d6d8ac0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a910500000000000000ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951b83dea8fbf73fd6a53c0979541924789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 478.702046] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 478.709299] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 478.716553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 478.723804] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 478.747340] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 08:51:08 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 478.767174] autofs4:pid:14080:autofs4_fill_super: called with bogus options 2018/03/31 08:51:08 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d07") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:08 executing program 2: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0xdffffffffffffffc, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:08 executing program 7 (fault-call:5 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:08 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:08 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair(0x4, 0x802, 0x7, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000600)=0x10001) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r5}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000000980)={&(0x7f0000000740)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000a00)=""/101, 0x65}, {&(0x7f0000000840)=""/6, 0x6}], 0x2, &(0x7f00000008c0)=""/137, 0xffffffffffffff48, 0x1f}, 0x40) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f00000007c0)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x6, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f00000009c0)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000640)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000a80)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:08 executing program 2: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000740)='rpc_pipefs\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:08 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:08 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d07") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:08 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000300)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c40)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000c80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") socketpair$inet(0x1e, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair(0x18, 0x0, 0x3, &(0x7f00000007c0)) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000cc0)={r0}) 2018/03/31 08:51:08 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 479.240523] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 479.257825] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 479.258639] tmpfs: No value for mount option 'rpc_pipefs' [ 479.280172] autofs4:pid:14158:autofs4_fill_super: called with bogus options [ 479.289787] FAULT_INJECTION: forcing a failure. [ 479.289787] name failslab, interval 1, probability 0, space 0, times 0 [ 479.301188] CPU: 0 PID: 14162 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 479.308644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 479.317986] Call Trace: [ 479.320563] dump_stack+0x194/0x24d [ 479.324169] ? arch_local_irq_restore+0x53/0x53 [ 479.328823] ? __save_stack_trace+0x7e/0xd0 [ 479.333141] should_fail+0x8c0/0xa40 [ 479.336848] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 479.341933] ? kasan_kmalloc+0xad/0xe0 [ 479.345799] ? kmem_cache_alloc_trace+0x136/0x740 [ 479.350624] ? __memcg_init_list_lru_node+0x169/0x270 [ 479.355796] ? __list_lru_init+0x544/0x750 [ 479.360006] ? sget_userns+0x691/0xe40 [ 479.363886] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 479.368624] ? do_mount+0xea4/0x2bb0 [ 479.372313] ? SyS_mount+0xab/0x120 [ 479.375925] ? do_syscall_64+0x281/0x940 [ 479.379973] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.385318] ? find_held_lock+0x35/0x1d0 [ 479.389356] ? __lock_is_held+0xb6/0x140 [ 479.393414] ? check_same_owner+0x320/0x320 [ 479.397736] ? rcu_note_context_switch+0x710/0x710 [ 479.402656] should_failslab+0xec/0x120 [ 479.406622] kmem_cache_alloc_trace+0x4b/0x740 [ 479.411195] ? __kmalloc_node+0x33/0x70 [ 479.415860] ? __kmalloc_node+0x33/0x70 [ 479.419821] ? rcu_read_lock_sched_held+0x108/0x120 [ 479.424824] __memcg_init_list_lru_node+0x169/0x270 [ 479.429824] ? list_lru_add+0x7c0/0x7c0 [ 479.433783] ? __kmalloc_node+0x47/0x70 [ 479.437737] __list_lru_init+0x544/0x750 [ 479.441775] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 479.447638] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 479.452630] ? __lockdep_init_map+0xe4/0x650 [ 479.457019] ? lockdep_init_map+0x9/0x10 [ 479.461067] sget_userns+0x691/0xe40 [ 479.464755] ? set_anon_super+0x20/0x20 [ 479.468704] ? put_filp+0x90/0x90 [ 479.472134] ? destroy_unused_super.part.6+0xd0/0xd0 [ 479.477225] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 479.482230] ? trace_hardirqs_off+0x10/0x10 [ 479.486530] ? putname+0xee/0x130 [ 479.489961] ? cap_capable+0x1b5/0x230 [ 479.493835] ? security_capable+0x8e/0xc0 [ 479.497975] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 479.503147] ? ns_capable_common+0xcf/0x160 [ 479.507445] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 479.512624] mount_ns+0x6d/0x190 [ 479.515973] rpc_mount+0x9e/0xd0 [ 479.519319] mount_fs+0x66/0x2d0 [ 479.522663] vfs_kern_mount.part.26+0xc6/0x4a0 [ 479.527223] ? may_umount+0xa0/0xa0 [ 479.530826] ? _raw_read_unlock+0x22/0x30 [ 479.534961] ? __get_fs_type+0x8a/0xc0 [ 479.538824] do_mount+0xea4/0x2bb0 [ 479.542344] ? copy_mount_string+0x40/0x40 [ 479.546555] ? rcu_pm_notify+0xc0/0xc0 [ 479.550422] ? copy_mount_options+0x5f/0x2e0 [ 479.554804] ? rcu_read_lock_sched_held+0x108/0x120 [ 479.559803] ? kmem_cache_alloc_trace+0x459/0x740 [ 479.564630] ? kasan_check_write+0x14/0x20 [ 479.568839] ? _copy_from_user+0x99/0x110 [ 479.572964] ? copy_mount_options+0x1f7/0x2e0 [ 479.577444] SyS_mount+0xab/0x120 [ 479.580878] ? copy_mnt_ns+0xb30/0xb30 [ 479.584752] do_syscall_64+0x281/0x940 [ 479.588620] ? vmalloc_sync_all+0x30/0x30 [ 479.592745] ? _raw_spin_unlock_irq+0x27/0x70 [ 479.597220] ? finish_task_switch+0x1c1/0x7e0 [ 479.601714] ? syscall_return_slowpath+0x550/0x550 [ 479.606627] ? syscall_return_slowpath+0x2ac/0x550 [ 479.611534] ? prepare_exit_to_usermode+0x350/0x350 [ 479.616525] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 479.621875] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 479.626715] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 479.631891] RIP: 0033:0x454e79 [ 479.635056] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 479.642744] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 479.650002] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 479.657256] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 479.664503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 479.671750] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 479.708241] tmpfs: No value for mount option 'rpc_pipefs' [ 479.715930] autofs4:pid:14162:autofs4_fill_super: called with bogus options [ 479.724278] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 479.740635] autofs4:pid:14172:autofs4_fill_super: called with bogus options [ 479.741673] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 08:51:09 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:09 executing program 7 (fault-call:5 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) mount(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)='./file1\x00', &(0x7f0000000cc0)='pipefs\x00', 0x1, &(0x7f0000002280)="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") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:09 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x8001) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:09 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:09 executing program 2: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', r2}, 0x10) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000840)={r4, &(0x7f00000007c0)="7029baaac05e761935d6da3959b682a7bc0e8eadffd97a198b8f6ea7f109e77c2855b657a8e8f7ed01d139d41f29a0768a8a87d1943e5f3b992f5e", &(0x7f0000000800)="3e4ae9f4506ef09efe7ac0072ee1bbc28484ebb58c1f8538e1c43114034f356be84b070dcbc49e76ac9266a700f5"}, 0x20) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000880)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:09 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d07") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:09 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file1/file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 480.158061] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 480.185607] FAULT_INJECTION: forcing a failure. [ 480.185607] name failslab, interval 1, probability 0, space 0, times 0 [ 480.196956] CPU: 0 PID: 14213 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 480.204226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.213573] Call Trace: [ 480.216160] dump_stack+0x194/0x24d [ 480.219791] ? arch_local_irq_restore+0x53/0x53 [ 480.224455] ? __save_stack_trace+0x7e/0xd0 [ 480.228777] should_fail+0x8c0/0xa40 [ 480.232488] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 480.237587] ? kasan_kmalloc+0xad/0xe0 [ 480.241469] ? kmem_cache_alloc_trace+0x136/0x740 [ 480.246301] ? __memcg_init_list_lru_node+0x169/0x270 [ 480.251472] ? __list_lru_init+0x544/0x750 [ 480.255692] ? sget_userns+0x691/0xe40 [ 480.259580] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 480.264326] ? do_mount+0xea4/0x2bb0 [ 480.268518] ? SyS_mount+0xab/0x120 [ 480.272135] ? do_syscall_64+0x281/0x940 [ 480.276187] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.281538] ? find_held_lock+0x35/0x1d0 [ 480.285579] ? __lock_is_held+0xb6/0x140 [ 480.289630] ? check_same_owner+0x320/0x320 [ 480.293941] ? rcu_note_context_switch+0x710/0x710 [ 480.298859] should_failslab+0xec/0x120 [ 480.302824] kmem_cache_alloc_trace+0x4b/0x740 [ 480.307398] ? __kmalloc_node+0x33/0x70 [ 480.311349] ? __kmalloc_node+0x33/0x70 [ 480.315309] ? rcu_read_lock_sched_held+0x108/0x120 [ 480.320303] __memcg_init_list_lru_node+0x169/0x270 [ 480.325301] ? list_lru_add+0x7c0/0x7c0 [ 480.329252] ? __kmalloc_node+0x47/0x70 [ 480.333215] __list_lru_init+0x544/0x750 [ 480.337264] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 480.343143] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 480.348142] ? __lockdep_init_map+0xe4/0x650 [ 480.352551] ? lockdep_init_map+0x9/0x10 [ 480.356596] sget_userns+0x691/0xe40 [ 480.360288] ? set_anon_super+0x20/0x20 [ 480.364243] ? put_filp+0x90/0x90 [ 480.367670] ? destroy_unused_super.part.6+0xd0/0xd0 [ 480.372752] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 480.377752] ? trace_hardirqs_off+0x10/0x10 [ 480.382047] ? putname+0xee/0x130 [ 480.385478] ? cap_capable+0x1b5/0x230 [ 480.389342] ? security_capable+0x8e/0xc0 [ 480.393466] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 480.398630] ? ns_capable_common+0xcf/0x160 [ 480.402928] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 480.408101] mount_ns+0x6d/0x190 [ 480.411459] rpc_mount+0x9e/0xd0 [ 480.414809] mount_fs+0x66/0x2d0 [ 480.418152] vfs_kern_mount.part.26+0xc6/0x4a0 [ 480.422711] ? may_umount+0xa0/0xa0 [ 480.426315] ? _raw_read_unlock+0x22/0x30 [ 480.430449] ? __get_fs_type+0x8a/0xc0 [ 480.434312] do_mount+0xea4/0x2bb0 [ 480.437828] ? copy_mount_string+0x40/0x40 [ 480.442037] ? rcu_pm_notify+0xc0/0xc0 [ 480.445912] ? copy_mount_options+0x5f/0x2e0 [ 480.450307] ? rcu_read_lock_sched_held+0x108/0x120 [ 480.455305] ? kmem_cache_alloc_trace+0x459/0x740 [ 480.460123] ? kasan_check_write+0x14/0x20 [ 480.464336] ? copy_mount_options+0x1f7/0x2e0 [ 480.468805] SyS_mount+0xab/0x120 [ 480.472231] ? copy_mnt_ns+0xb30/0xb30 [ 480.476095] do_syscall_64+0x281/0x940 [ 480.479963] ? vmalloc_sync_all+0x30/0x30 [ 480.484089] ? _raw_spin_unlock_irq+0x27/0x70 [ 480.488559] ? finish_task_switch+0x1c1/0x7e0 [ 480.493029] ? syscall_return_slowpath+0x550/0x550 [ 480.497931] ? syscall_return_slowpath+0x2ac/0x550 [ 480.502845] ? prepare_exit_to_usermode+0x350/0x350 [ 480.507847] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 480.513191] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 480.518021] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 480.523196] RIP: 0033:0x454e79 [ 480.526360] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 480.534042] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 480.541285] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 480.548531] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 480.555780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 480.563120] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 480.578688] tmpfs: No value for mount option 'rpc_pipefs' [ 480.585093] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 480.586110] autofs4:pid:14213:autofs4_fill_super: called with bogus options 2018/03/31 08:51:10 executing program 7 (fault-call:5 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 480.608140] tmpfs: No value for mount option 'rpc_pipefs' [ 480.614411] autofs4:pid:14218:autofs4_fill_super: called with bogus options 2018/03/31 08:51:10 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000e00)={r0, &(0x7f0000000c40)="967941fe0ba733e32929a543e17b016050b17eec7247d27da1be90475af7a68394210536e7151c7651b979300ddcb9d84682b019f13fa3f8aabc4a3bf2c4f07d0c54abdc989bba8329a508687d53285d62d4675661638b1397841c796343e2855e7ec4905269b64f971274f082210856d81a5daf902cdc09ada2e1e93750537e950dd494042e055f2a46f59896eb5ef5a4265cbbc8df74ee5fcc72d7fba7f66e418f0be3780da383cf443272051a", &(0x7f0000000d00)="93f0f0fcc1cabc9de6e76490a9a778e08174a3fe09905aadccb51096051db00360179ba9858f8c0dc97f4f0f4fc8068ae0d009ca4a4dde81cc989c30bd4c84e202f1d78d9705cfe50ddaff679959c60782bec4a30293426ec8bf5a2d441992056fd197e9de78ad5a72fe268ae5faa9455e2372ee83bc32e912312c4bf9baac4bef38e4250c1fdf5f4fd93b0ba4bb3e676a35d89d6af405d385f5ca4e187afa79d22148fdd48a0d6cf79ee8eaaaf2058d7091d9188c8a08635b039b164b35b8a0c821"}, 0x20) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") mount(&(0x7f0000000e40)='./file0/file0\x00', &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)='fuseblk\x00', 0x10000, &(0x7f0000000f00)="6f855deb32c368ae0b07da9e54cd6dec26cc96d19506e2b0eb7af3a9bb550c71b3402846b2dee41034b1cace8c8fd0ec522440c89ca65ab83a7f6ceecf2e162e6809c6ca6f8c9930b6f0a4dc871cf5f6a58e5238790d9290c65081f31e438ff0501c852147ca78974efdcdc41238806cdc3955a3a2c64a655ea7789b18eac7cd1d6e6014a96d85f77b57e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 480.672872] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 480.680414] tmpfs: No value for mount option 'rpc_pipefs' [ 480.692855] autofs4:pid:14218:autofs4_fill_super: called with bogus options 2018/03/31 08:51:10 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:10 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x5, 0x20, 0x39, 0x0, 0xa, r2, 0x691e}, 0x2c) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0x30) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) r6 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file1\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000008c0)='squashfs\x00') mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000780)={0x0, 0x9, 0xff, 0x2, 0x10, 0xffffffffffffffff, 0x7fff}, 0x2c) perf_event_open(&(0x7f0000000840)={0x5, 0x70, 0x0, 0x9, 0x6, 0x98d, 0x0, 0x8000000000000000, 0x3084, 0x2, 0x20, 0x7, 0x2, 0x6, 0xccaa, 0x5, 0x9, 0x7fffffff, 0xfb24, 0x80, 0x5, 0x4, 0x401, 0x3f, 0x4, 0x3, 0x8a, 0x7, 0xeca, 0x2, 0x3, 0x3, 0x7, 0x0, 0x1000, 0x2, 0xb13c, 0xffffffff, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000800), 0x1}, 0x2, 0xfffffffffffffc00, 0x40, 0x3, 0x0, 0x20, 0x6}, r0, 0x6, r5, 0x8) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x8, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000940)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000980)="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") mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000007c0)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:10 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:10 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a3") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:10 executing program 2: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) mkdir(&(0x7f0000000780)='./file1\x00', 0x96) mount(&(0x7f00000007c0)='./file1\x00', &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)='mqueue\x00', 0x8000, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:10 executing program 6: r0 = gettid() socket$kcm(0x29, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000140)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 480.992389] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 481.005230] FAULT_INJECTION: forcing a failure. [ 481.005230] name failslab, interval 1, probability 0, space 0, times 0 [ 481.016495] CPU: 1 PID: 14260 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 481.023763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.033113] Call Trace: [ 481.035709] dump_stack+0x194/0x24d [ 481.039330] ? arch_local_irq_restore+0x53/0x53 [ 481.043987] ? __save_stack_trace+0x7e/0xd0 [ 481.048311] should_fail+0x8c0/0xa40 [ 481.052026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 481.057131] ? kasan_kmalloc+0xad/0xe0 [ 481.061011] ? kmem_cache_alloc_trace+0x136/0x740 [ 481.065366] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 481.065843] ? __memcg_init_list_lru_node+0x169/0x270 [ 481.065855] ? __list_lru_init+0x544/0x750 [ 481.086058] ? sget_userns+0x691/0xe40 [ 481.089941] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 481.092378] tmpfs: No value for mount option 'rpc_pipefs' [ 481.094688] ? do_mount+0xea4/0x2bb0 [ 481.094696] ? SyS_mount+0xab/0x120 [ 481.094708] ? do_syscall_64+0x281/0x940 [ 481.094719] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.094733] ? find_held_lock+0x35/0x1d0 [ 481.094743] ? __lock_is_held+0xb6/0x140 [ 481.094759] ? check_same_owner+0x320/0x320 [ 481.094770] ? rcu_note_context_switch+0x710/0x710 [ 481.094783] should_failslab+0xec/0x120 [ 481.112430] autofs4:pid:14264:autofs4_fill_super: called with bogus options [ 481.117006] kmem_cache_alloc_trace+0x4b/0x740 [ 481.117015] ? __kmalloc_node+0x33/0x70 [ 481.117023] ? __kmalloc_node+0x33/0x70 [ 481.117033] ? rcu_read_lock_sched_held+0x108/0x120 [ 481.117047] __memcg_init_list_lru_node+0x169/0x270 [ 481.117058] ? list_lru_add+0x7c0/0x7c0 [ 481.117066] ? __kmalloc_node+0x47/0x70 [ 481.117080] __list_lru_init+0x544/0x750 [ 481.117092] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 481.117103] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 481.117112] ? __lockdep_init_map+0xe4/0x650 [ 481.164928] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 481.167913] ? lockdep_init_map+0x9/0x10 [ 481.167927] sget_userns+0x691/0xe40 [ 481.167935] ? set_anon_super+0x20/0x20 [ 481.167946] ? put_filp+0x90/0x90 [ 481.167957] ? destroy_unused_super.part.6+0xd0/0xd0 [ 481.167970] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 481.167980] ? trace_hardirqs_off+0x10/0x10 [ 481.167990] ? putname+0xee/0x130 [ 481.168003] ? cap_capable+0x1b5/0x230 [ 481.182372] autofs4:pid:14274:autofs4_fill_super: called with bogus options [ 481.185824] ? security_capable+0x8e/0xc0 [ 481.185839] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 481.185851] ? ns_capable_common+0xcf/0x160 [ 481.185862] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 481.185873] mount_ns+0x6d/0x190 [ 481.185884] rpc_mount+0x9e/0xd0 [ 481.185893] mount_fs+0x66/0x2d0 [ 481.185905] vfs_kern_mount.part.26+0xc6/0x4a0 [ 481.185913] ? may_umount+0xa0/0xa0 [ 481.185925] ? _raw_read_unlock+0x22/0x30 [ 481.193667] tmpfs: No value for mount option 'rpc_pipefs' [ 481.195318] ? __get_fs_type+0x8a/0xc0 [ 481.195333] do_mount+0xea4/0x2bb0 [ 481.195347] ? copy_mount_string+0x40/0x40 [ 481.195358] ? rcu_pm_notify+0xc0/0xc0 [ 481.195372] ? copy_mount_options+0x5f/0x2e0 [ 481.195381] ? rcu_read_lock_sched_held+0x108/0x120 [ 481.195392] ? kmem_cache_alloc_trace+0x459/0x740 [ 481.195403] ? kasan_check_write+0x14/0x20 [ 481.195416] ? _copy_from_user+0x99/0x110 [ 481.334549] ? copy_mount_options+0x1f7/0x2e0 [ 481.339029] SyS_mount+0xab/0x120 [ 481.342457] ? copy_mnt_ns+0xb30/0xb30 [ 481.346321] do_syscall_64+0x281/0x940 [ 481.350183] ? vmalloc_sync_all+0x30/0x30 [ 481.354309] ? _raw_spin_unlock_irq+0x27/0x70 [ 481.358782] ? finish_task_switch+0x1c1/0x7e0 [ 481.363252] ? syscall_return_slowpath+0x550/0x550 [ 481.368157] ? syscall_return_slowpath+0x2ac/0x550 [ 481.373061] ? prepare_exit_to_usermode+0x350/0x350 [ 481.378052] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 481.383393] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 481.388212] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.393376] RIP: 0033:0x454e79 [ 481.396543] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 481.404226] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 481.411475] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 481.418719] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 481.425962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 481.433206] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/31 08:51:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mkdir(&(0x7f0000000c40)='./file0\x00', 0x2) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:11 executing program 7 (fault-call:5 fault-nth:18): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 481.460137] tmpfs: No value for mount option 'rpc_pipefs' [ 481.467896] autofs4:pid:14260:autofs4_fill_super: called with bogus options 2018/03/31 08:51:11 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000c80)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000740)=0x6) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) recvmsg$kcm(r4, &(0x7f0000000c40)={&(0x7f0000000780), 0x80, &(0x7f0000000b00)=[{&(0x7f0000000800)=""/165, 0xa5}, {&(0x7f00000008c0)=""/93, 0x5d}, {&(0x7f0000000940)=""/182, 0xb6}, {&(0x7f0000000a00)=""/207, 0xcf}], 0x4, &(0x7f0000000b40)=""/209, 0xd1, 0x1}, 0x20) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f0000000cc0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socket$kcm(0x29, 0x5, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:11 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:11 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a3") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:11 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) [ 481.707966] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 481.728288] tmpfs: No value for mount option 'rpc_pipefs' [ 481.736092] autofs4:pid:14305:autofs4_fill_super: called with bogus options [ 481.762536] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 481.778403] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 481.798289] tmpfs: No value for mount option 'rpc_pipefs' [ 481.800781] FAULT_INJECTION: forcing a failure. [ 481.800781] name failslab, interval 1, probability 0, space 0, times 0 [ 481.815147] CPU: 0 PID: 14309 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 481.817726] autofs4:pid:14305:autofs4_fill_super: called with bogus options [ 481.822410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.822416] Call Trace: [ 481.822433] dump_stack+0x194/0x24d [ 481.822448] ? arch_local_irq_restore+0x53/0x53 [ 481.822460] ? __save_stack_trace+0x7e/0xd0 [ 481.822478] should_fail+0x8c0/0xa40 [ 481.822490] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 481.822504] ? kasan_kmalloc+0xad/0xe0 [ 481.866672] ? kmem_cache_alloc_trace+0x136/0x740 [ 481.871494] ? __memcg_init_list_lru_node+0x169/0x270 [ 481.876657] ? __list_lru_init+0x544/0x750 [ 481.880876] ? sget_userns+0x691/0xe40 [ 481.884746] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 481.889473] ? do_mount+0xea4/0x2bb0 [ 481.893161] ? SyS_mount+0xab/0x120 [ 481.896766] ? do_syscall_64+0x281/0x940 [ 481.900808] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 481.906160] ? find_held_lock+0x35/0x1d0 [ 481.910207] ? __lock_is_held+0xb6/0x140 [ 481.914255] ? check_same_owner+0x320/0x320 [ 481.918563] ? rcu_note_context_switch+0x710/0x710 [ 481.923481] should_failslab+0xec/0x120 [ 481.927432] kmem_cache_alloc_trace+0x4b/0x740 [ 481.931987] ? __kmalloc_node+0x33/0x70 [ 481.935943] ? __kmalloc_node+0x33/0x70 [ 481.939897] ? rcu_read_lock_sched_held+0x108/0x120 [ 481.944889] __memcg_init_list_lru_node+0x169/0x270 [ 481.949881] ? list_lru_add+0x7c0/0x7c0 [ 481.953828] ? __kmalloc_node+0x47/0x70 [ 481.957780] __list_lru_init+0x544/0x750 [ 481.961820] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 481.967680] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 481.972669] ? __lockdep_init_map+0xe4/0x650 [ 481.977052] ? lockdep_init_map+0x9/0x10 [ 481.981091] sget_userns+0x691/0xe40 [ 481.984779] ? set_anon_super+0x20/0x20 [ 481.988737] ? put_filp+0x90/0x90 [ 481.992165] ? destroy_unused_super.part.6+0xd0/0xd0 [ 481.997246] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 482.002238] ? trace_hardirqs_off+0x10/0x10 [ 482.006546] ? putname+0xee/0x130 [ 482.009979] ? cap_capable+0x1b5/0x230 [ 482.013841] ? security_capable+0x8e/0xc0 [ 482.017966] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 482.023136] ? ns_capable_common+0xcf/0x160 [ 482.027438] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 482.032610] mount_ns+0x6d/0x190 [ 482.035961] rpc_mount+0x9e/0xd0 [ 482.039304] mount_fs+0x66/0x2d0 [ 482.042662] vfs_kern_mount.part.26+0xc6/0x4a0 [ 482.047225] ? may_umount+0xa0/0xa0 [ 482.050825] ? _raw_read_unlock+0x22/0x30 [ 482.054947] ? __get_fs_type+0x8a/0xc0 [ 482.058820] do_mount+0xea4/0x2bb0 [ 482.062343] ? copy_mount_string+0x40/0x40 [ 482.066549] ? rcu_pm_notify+0xc0/0xc0 [ 482.070415] ? copy_mount_options+0x5f/0x2e0 [ 482.074808] ? rcu_read_lock_sched_held+0x108/0x120 [ 482.079800] ? kmem_cache_alloc_trace+0x459/0x740 [ 482.084621] ? copy_mount_options+0x1f7/0x2e0 [ 482.089094] SyS_mount+0xab/0x120 [ 482.092535] ? copy_mnt_ns+0xb30/0xb30 [ 482.096402] do_syscall_64+0x281/0x940 [ 482.100269] ? vmalloc_sync_all+0x30/0x30 [ 482.104394] ? _raw_spin_unlock_irq+0x27/0x70 [ 482.108864] ? finish_task_switch+0x1c1/0x7e0 [ 482.113337] ? syscall_return_slowpath+0x550/0x550 [ 482.118242] ? syscall_return_slowpath+0x2ac/0x550 [ 482.123147] ? prepare_exit_to_usermode+0x350/0x350 [ 482.128141] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 482.133481] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 482.138300] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.143468] RIP: 0033:0x454e79 [ 482.146632] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 482.154319] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 482.161572] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 482.168818] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 482.176064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 482.183312] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 [ 482.216660] tmpfs: No value for mount option 'rpc_pipefs' [ 482.223182] autofs4:pid:14309:autofs4_fill_super: called with bogus options 2018/03/31 08:51:12 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0xb55, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000740)=r5, 0x4) 2018/03/31 08:51:12 executing program 7 (fault-call:5 fault-nth:19): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:12 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) perf_event_open(&(0x7f00000007c0)={0x0, 0x70, 0x9, 0x1000, 0x6, 0x1ff, 0x0, 0x7fffffff, 0x2208, 0x8, 0x5c06a60f, 0x4, 0x7ff, 0x3, 0xffffffff80000000, 0x1, 0x4, 0x4, 0x0, 0x3, 0x5, 0x622b02a5, 0x8, 0x5, 0x100000000, 0x81, 0x9, 0x2, 0x0, 0x5, 0x8000000080000000, 0x80000001, 0x200, 0x840, 0x80, 0x2, 0x2, 0xe00000000000000, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000780), 0x1}, 0x10000, 0x200, 0x2, 0x2, 0x1, 0xfffffffffffffff8, 0x3}, r0, 0xb, r3, 0x8) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20000000000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000018c0)={r4, 0x0, 0x4e, 0x1000, &(0x7f0000000840)="82c085bffc26a625a1a898aef3a95b4d101e692c2bbbd7a3c770d89e8ac321ccaf05ff8d3d1d4603066ec518b4e5687d8132973bbd636814f8c03023eb0ac63536cac76e40f49d0b0adaa4bd8b06", &(0x7f00000008c0)=""/4096, 0x8, 0x400}, 0x28) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001a00)={&(0x7f00000019c0)='./file1\x00', r6}, 0x6) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000480)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000740)={r4}) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000004280)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) socketpair$inet(0x2, 0x8000a, 0x2, &(0x7f0000000c80)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000e40)={&(0x7f0000000cc0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000d40)=""/180, 0xb4}], 0x1, &(0x7f0000002280)=""/4096, 0x1000, 0x401}, 0x20) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/bus/file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000c40)='./file0/bus\x00', 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r3, 0x3, 0x8}, 0xc) recvmsg(r2, &(0x7f0000001100)={&(0x7f0000000e80)=@ax25, 0x80, &(0x7f00000010c0)=[{&(0x7f0000000f00)=""/101, 0x65}, {&(0x7f0000000f80)=""/82, 0x52}, {&(0x7f0000001000)=""/63, 0x3f}, {&(0x7f0000001040)=""/125, 0x7d}], 0x4, &(0x7f0000003280)=""/4096, 0x1000, 0x2}, 0x100) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") mount(&(0x7f0000000340)='./file0/bus\x00', &(0x7f0000000380)='./file2\x00', &(0x7f00000003c0)='qnx4\x00', 0x3000080, &(0x7f0000000400)="4a4d683f18138ba3a295217d727655a31fbf2ef7db49074cdd7fbc53d928eb17830bcc105da8a1861b801e23a145ddd546491e74c1b767caac49f77dd0f717a05a194905996ec5bb1fa93bb163eb8f3b79b02e1d34ee4b8f2ff5e17d1001c74bc4") 2018/03/31 08:51:12 executing program 2: r0 = gettid() socket$kcm(0x29, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r5}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) sendmsg(r3, &(0x7f00000011c0)={&(0x7f0000000840)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x0, 0x1, 0x4, 0x0, {0xa, 0x4e24, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x5}}}, 0x80, &(0x7f0000000dc0)=[{&(0x7f00000008c0)="3147f74a6c3a86f7f0570225a4ec56155d1aa6d3f7efa9258bedc1212a2c", 0x1e}, {&(0x7f0000000900)="2470a0eb1b802239b136ad7b1dbe652ee4628cd4a72f0ba9012a321b6fe4a666ea6de0d59ccffc6d3759c3df6c36bea4eafd700e8cbb0ba85bc288450820dfe4fc99741b048a1e301e32fcf4440a54d870550044e3283f97631f62d29a3d505b6fc906f3950a720f45e89d325f942e000936837db6e6cf9cd3af18c060b6cd4f8286c1392e0ca7210eced7e43971fed37ab115b0a5cf5d4cabee4a6389c62c8f539ce5d2269093322b18bf2aae01c1b2b026c41d65820fb2a47d1868f94b4eb8fc65", 0xc2}, {&(0x7f0000000a00)="10f366a6c3899b3d9c59a6c1ad10a262e161a00e5ef4f62f5419010ebb59eafcbcc5f574fe49b94f7e999d2dc62250dec795903d4f9940f913a6bd8fea7d444649817a31f61f2c205dc45cd7bc53aeebd50fd1902a4f35273c25ec46e9a6e611bf5dbc2b2f3a0bf64d83e7f69c55552bdda99bc10cae0655461436b3c93d6ce764f94d8a6796ea106c2722303e9a75e5afc7f4ad96e1b59801d015fe", 0x9c}, {&(0x7f0000000ac0)="dae4894f83b116a762a90b386113729ce8d0a5c0e2fc2bd543c176367a31307b764bedc921df3b4a1a3f88fbd7f1f489f31956a90c2feab4b7b79ecacb4890d2e4e3d13bdc64e8a87cfff74d995b17c2a1e1bef19a658724203417f110fa6d7370ee4d093552e4378157856814cf1094a850a47f20143bd19525aa0616e580245c8be5a92de8dfe89f", 0x89}, {&(0x7f0000000b80)="68906e470af69e0ba7b23ab88b1f083d27e970b5084a9662b63ebb9dd8327bc5486bb57619f0a833044867d9ccebdecbc8f6cf7004f89f6228c20529e48a195270a8ec7a63bbeff8a5ae060a059f1a040ca2183d93a0c26563a18c190fd4aa", 0x5f}, {&(0x7f0000000c00)="2993cd701064d60e1ed97828b7153de4ea47a0de859066d200a5e4445cd35667fefa607f5d821495f885dc48c3d28eb29e4b80527284a0a22e1956efb5aff734db642fa08a0307f8717ca1c390226067dfd38b69a5f8a374d92a61e6a8fbc1f3a33c9e9016c80c10d340834a7b163c47a908241eb536eb3101df4e255780c846f11a31f1f126d41da50802fcf8e10d52b89656d2ced65c4ba02ee312", 0x9c}, {&(0x7f0000000cc0)="97a8da909695d4015b42f5d8d62a4b29bf8bf8e40b2ddd1c2f9ed9de5277b6ce0affda9a967926af187268e238b6412bc61400671bcdb6019b9aab0cf1740a87377189a3e01267da00033720f91f14de33547f6445655f78b5ed19ad50c3551eb4a139693b8e726757f5a1f0255a08e850ff2b141112b75ae5504015f8a44814d999bba69b4fca5b9f37632bf5196c99f943ade8a046901cdfd0c027bfe83f115575a83aa0d67d4f2e3c643ac85c44fbc42ee8a5a19b87effd5583d8128bd4fc4983981e6e004e54bf9722700b177f", 0xcf}], 0x7, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"], 0x380, 0x80}, 0x1) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x19) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000800)={r6, 0x0, 0x57, 0x2f, &(0x7f0000000740)="1c7a0087c8a6e8dfba915a4abc5833ce20960c079cfd8db493c4d32f886e04fbebcb09d155f90874ec420e39bbc3492a2fa3b3433293033e1c6fc880589842f9076f2cae940d0c8a6c6abd3fbe764be983c8cc47d18aaa", &(0x7f00000007c0)=""/47, 0x101, 0x8000}, 0x28) sendmsg$kcm(r3, &(0x7f0000001700)={&(0x7f0000001200)=@pppol2tpv3={0x18, 0x1, {0x0, r5, {0x2, 0x4e23, @multicast1=0xe0000001}, 0x3, 0x3, 0x2}}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001280)="5ffdb875a65ee2a3e369d0af25b7a244da0d9d4be1d31ea4401ce966e90026e82e06e6a6fbc8ebab8759fd63e6cb0fd7c4d6ee6a23dc13e1929d95e6d4a543c208c61ded991af862d531a6e48c9fac6c84d75c4efd748794cb4b03e6360bd413d8d93f764f10e6ff77dee423be5d07996867228f175fc21e10baf3948dbd76a7a3baa5dea4574fe5b13f9c3168503d377339a7704e82b8fbd13f6ec1f5a26a1c0829594bf6f0f8842f45", 0xaa}, {&(0x7f0000001340)="9752419e6a9207caad97e2a008c4e008dfa6248dc7df5444a0ff9da1c9d8989fcf79719587697816605f61ba2d295b1677a675e3f9285610b62a555a6baa45fa10dffa7770c786443f13f3108f26b2680196e63fd304b4748808739c", 0x5c}, {&(0x7f00000013c0)="d60696990a9d603ac5b4b3044151cc8f205b83ef8a1922f6402a898ab6a537ba1c45617a84f6d749e90853c8f6af9278ed4b372733", 0x35}, {&(0x7f0000001400)="400725c1acf07e78cdce7b37232046ac6ec42949e209ed1ed22233", 0x1b}, {&(0x7f0000001440)="4d7c78726268228f198964e4c3ca29549f61525cea756867410ea072e7c293f9e3e4f859843d61a42f87b5b6e6cae4036e09bc970d448c18eeaafa759493773da0d74c3abf3103d8ca671c8652aa272477edd6743dc0a30afc1ce2ec9048241e4cb9923d2630e0a8493581144b28f0dc74f3bbc948850504332658a4df1f68c544bb63a3f80cf609ac48a32a1c2bb8c6a2b98d06ed1f68f07b20e42b6631b4e8fa5b92b188ea06be1ad3d7d752e6f4e81deb39226ddf8bb7143d3cc8dcc5c640b9b44a153a75350ccc659ff7ce7e8e1bd9", 0xd1}], 0x5, &(0x7f00000015c0)=[{0x88, 0x10f, 0x0, "d14a5560be5e077221bafec1a6202905e1dec615cdb08740326e4f9a27606cb6cd804364e46b882c85ec57ee8247ebf016278a16bd433c41345aa64e4baccb503dcd673803e63e5313c9689ed6cd8da2d1a7bae7c4a7197485c2254b9dbb6f27c577d0d985a65e857ac3dca15a203224a925ae"}, {0xa0, 0x119, 0x40, "b6fb3850c616eb8dd1890a74fbc70f4ea62bb7b520b5cc3e8fa3c65af075a8d8e6678418ad61a8eddc54e9e566f4d6486fa5fdb8f50b13478faf057d8811eb11cd22e2abe2e651e4106174aa661987fe84f58764ed9a7b3581e85f2397b7df328c1876e5ca8e670ddf2958de15d467ab3e38d6411dc32b9ad596c7f98efb0e452504ffd2312be92810"}], 0x128, 0x24008000}, 0x20000080) 2018/03/31 08:51:12 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:12 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:12 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a3") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 482.623136] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 482.624073] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 482.649513] FAULT_INJECTION: forcing a failure. [ 482.649513] name failslab, interval 1, probability 0, space 0, times 0 [ 482.660763] CPU: 0 PID: 14353 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 482.668022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.677359] Call Trace: [ 482.679928] dump_stack+0x194/0x24d [ 482.683530] ? arch_local_irq_restore+0x53/0x53 [ 482.688185] ? __save_stack_trace+0x7e/0xd0 [ 482.692505] should_fail+0x8c0/0xa40 [ 482.696216] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 482.701312] ? kasan_kmalloc+0xad/0xe0 [ 482.705194] ? kmem_cache_alloc_trace+0x136/0x740 [ 482.710023] ? __memcg_init_list_lru_node+0x169/0x270 [ 482.715208] ? __list_lru_init+0x544/0x750 [ 482.719429] ? sget_userns+0x691/0xe40 [ 482.723303] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 482.728046] ? do_mount+0xea4/0x2bb0 [ 482.731742] ? SyS_mount+0xab/0x120 [ 482.735364] ? do_syscall_64+0x281/0x940 [ 482.739412] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.744762] ? find_held_lock+0x35/0x1d0 [ 482.748800] ? __lock_is_held+0xb6/0x140 [ 482.752854] ? check_same_owner+0x320/0x320 [ 482.757178] ? rcu_note_context_switch+0x710/0x710 [ 482.762102] should_failslab+0xec/0x120 [ 482.766066] kmem_cache_alloc_trace+0x4b/0x740 [ 482.770637] ? __kmalloc_node+0x33/0x70 [ 482.774597] ? __kmalloc_node+0x33/0x70 [ 482.778556] ? rcu_read_lock_sched_held+0x108/0x120 [ 482.783563] __memcg_init_list_lru_node+0x169/0x270 [ 482.788558] ? list_lru_add+0x7c0/0x7c0 [ 482.792520] ? __kmalloc_node+0x47/0x70 [ 482.796505] __list_lru_init+0x544/0x750 [ 482.800549] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 482.806411] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 482.811408] ? __lockdep_init_map+0xe4/0x650 [ 482.815810] ? lockdep_init_map+0x9/0x10 [ 482.819859] sget_userns+0x691/0xe40 [ 482.823556] ? set_anon_super+0x20/0x20 [ 482.827504] ? put_filp+0x90/0x90 [ 482.830942] ? destroy_unused_super.part.6+0xd0/0xd0 [ 482.836037] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 482.841046] ? trace_hardirqs_off+0x10/0x10 [ 482.845358] ? putname+0xee/0x130 [ 482.848800] ? cap_capable+0x1b5/0x230 [ 482.852671] ? security_capable+0x8e/0xc0 [ 482.856798] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 482.861964] ? ns_capable_common+0xcf/0x160 [ 482.866275] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 482.871445] mount_ns+0x6d/0x190 [ 482.874796] rpc_mount+0x9e/0xd0 [ 482.878148] mount_fs+0x66/0x2d0 [ 482.881488] vfs_kern_mount.part.26+0xc6/0x4a0 [ 482.886049] ? may_umount+0xa0/0xa0 [ 482.889656] ? _raw_read_unlock+0x22/0x30 [ 482.893777] ? __get_fs_type+0x8a/0xc0 [ 482.897639] do_mount+0xea4/0x2bb0 [ 482.901156] ? copy_mount_string+0x40/0x40 [ 482.905371] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 482.910374] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 482.915119] ? retint_kernel+0x10/0x10 [ 482.918990] ? copy_mount_options+0x18b/0x2e0 [ 482.923564] ? copy_mount_options+0x196/0x2e0 [ 482.928040] ? copy_mount_options+0x1f7/0x2e0 [ 482.932518] SyS_mount+0xab/0x120 [ 482.935960] ? copy_mnt_ns+0xb30/0xb30 [ 482.939829] do_syscall_64+0x281/0x940 [ 482.943697] ? vmalloc_sync_all+0x30/0x30 [ 482.947828] ? _raw_spin_unlock_irq+0x27/0x70 [ 482.952301] ? finish_task_switch+0x1c1/0x7e0 [ 482.956785] ? syscall_return_slowpath+0x550/0x550 [ 482.961699] ? syscall_return_slowpath+0x2ac/0x550 [ 482.966622] ? prepare_exit_to_usermode+0x350/0x350 [ 482.971626] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 482.976974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 482.981801] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 482.986965] RIP: 0033:0x454e79 [ 482.990129] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 482.997814] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 483.005064] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 483.012315] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 483.019649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 483.026895] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 483.046223] tmpfs: No value for mount option 'rpc_pipefs' [ 483.053975] tmpfs: No value for mount option 'rpc_pipefs' [ 483.060408] autofs4:pid:14354:autofs4_fill_super: called with bogus options [ 483.061723] autofs4:pid:14353:autofs4_fill_super: called with bogus options 2018/03/31 08:51:12 executing program 7 (fault-call:5 fault-nth:20): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:12 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000d00)='./file0\x00', &(0x7f0000000d80)="000000d278000086b6f11d42e95a9d3225396b6228e7a1149877ae4d3f645cedb2487c42d8783aa572fbd6f3195b", 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)={0x3, 0x0, 0x6, 0x6, 0x1, 0xffffffffffffffff, 0xde}, 0x2c) mkdir(&(0x7f0000000c40)='./file0/bus\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 483.111623] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 483.137949] tmpfs: No value for mount option 'rpc_pipefs' [ 483.151287] autofs4:pid:14368:autofs4_fill_super: called with bogus options 2018/03/31 08:51:13 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:13 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000740)={0x7, 0x70, 0x6, 0x779f6fc6, 0x10001, 0x1, 0x0, 0x7, 0x0, 0x1, 0xffffffff, 0x8, 0x6, 0x2, 0x8, 0x10000, 0x4, 0x800, 0x3ff, 0x5, 0x80000001, 0x6, 0x800, 0x0, 0x2, 0x0, 0x8, 0x1, 0x401, 0x3, 0x0, 0x7, 0x0, 0x4, 0x3, 0x2, 0x3ff, 0x136dbf41, 0x0, 0x204, 0x6, @perf_config_ext={0x100000000, 0x8}, 0x20000, 0xfffffffffffff359, 0x7fff, 0x7, 0xc69, 0x2bcf, 0x9a}, r0, 0x6, r5, 0xb) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:13 executing program 2: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000740)) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000bc0)={r6, &(0x7f0000000a00)="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", &(0x7f0000000c40)=""/9}, 0xd5a934d03c4a38b8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:13 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:13 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) [ 483.469274] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 483.485519] FAULT_INJECTION: forcing a failure. [ 483.485519] name failslab, interval 1, probability 0, space 0, times 0 [ 483.496829] CPU: 1 PID: 14400 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 483.504098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 483.513443] Call Trace: [ 483.515005] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 483.516026] dump_stack+0x194/0x24d [ 483.516041] ? arch_local_irq_restore+0x53/0x53 [ 483.516051] ? __save_stack_trace+0x7e/0xd0 [ 483.516068] should_fail+0x8c0/0xa40 [ 483.516083] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 483.540502] tmpfs: No value for mount option 'rpc_pipefs' [ 483.543186] ? kasan_kmalloc+0xad/0xe0 [ 483.543198] ? kmem_cache_alloc_trace+0x136/0x740 [ 483.543209] ? __memcg_init_list_lru_node+0x169/0x270 [ 483.543218] ? __list_lru_init+0x544/0x750 [ 483.543226] ? sget_userns+0x691/0xe40 [ 483.543236] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 483.543244] ? do_mount+0xea4/0x2bb0 [ 483.543251] ? SyS_mount+0xab/0x120 [ 483.543260] ? do_syscall_64+0x281/0x940 [ 483.543274] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.580918] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 483.584245] ? find_held_lock+0x35/0x1d0 [ 483.584260] ? __lock_is_held+0xb6/0x140 [ 483.584280] ? check_same_owner+0x320/0x320 [ 483.609254] tmpfs: No value for mount option 'rpc_pipefs' [ 483.612133] ? rcu_note_context_switch+0x710/0x710 [ 483.612150] should_failslab+0xec/0x120 [ 483.612162] kmem_cache_alloc_trace+0x4b/0x740 [ 483.612171] ? __kmalloc_node+0x33/0x70 [ 483.612179] ? __kmalloc_node+0x33/0x70 [ 483.612189] ? rcu_read_lock_sched_held+0x108/0x120 [ 483.612204] __memcg_init_list_lru_node+0x169/0x270 [ 483.612218] ? list_lru_add+0x7c0/0x7c0 [ 483.661371] ? __kmalloc_node+0x47/0x70 [ 483.665352] __list_lru_init+0x544/0x750 [ 483.669419] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 483.675304] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 483.680317] ? __lockdep_init_map+0xe4/0x650 [ 483.684721] ? lockdep_init_map+0x9/0x10 [ 483.688780] sget_userns+0x691/0xe40 [ 483.692582] ? set_anon_super+0x20/0x20 [ 483.696555] ? put_filp+0x90/0x90 [ 483.700014] ? destroy_unused_super.part.6+0xd0/0xd0 [ 483.705115] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 483.710130] ? trace_hardirqs_off+0x10/0x10 [ 483.714459] ? putname+0xee/0x130 [ 483.717914] ? cap_capable+0x1b5/0x230 [ 483.721810] ? security_capable+0x8e/0xc0 [ 483.725959] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 483.731147] ? ns_capable_common+0xcf/0x160 [ 483.735469] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 483.740656] mount_ns+0x6d/0x190 [ 483.744021] rpc_mount+0x9e/0xd0 [ 483.747384] mount_fs+0x66/0x2d0 [ 483.750749] vfs_kern_mount.part.26+0xc6/0x4a0 [ 483.755329] ? may_umount+0xa0/0xa0 [ 483.758953] ? _raw_read_unlock+0x22/0x30 [ 483.763095] ? __get_fs_type+0x8a/0xc0 [ 483.766980] do_mount+0xea4/0x2bb0 [ 483.770521] ? copy_mount_string+0x40/0x40 [ 483.774756] ? rcu_pm_notify+0xc0/0xc0 [ 483.778646] ? copy_mount_options+0x5f/0x2e0 [ 483.783048] ? rcu_read_lock_sched_held+0x108/0x120 [ 483.788048] ? kmem_cache_alloc_trace+0x459/0x740 [ 483.792896] ? copy_mount_options+0x1f7/0x2e0 [ 483.797374] SyS_mount+0xab/0x120 [ 483.800807] ? copy_mnt_ns+0xb30/0xb30 [ 483.804687] do_syscall_64+0x281/0x940 [ 483.808567] ? vmalloc_sync_all+0x30/0x30 [ 483.812703] ? _raw_spin_unlock_irq+0x27/0x70 [ 483.817198] ? finish_task_switch+0x1c1/0x7e0 [ 483.821689] ? syscall_return_slowpath+0x550/0x550 [ 483.826618] ? syscall_return_slowpath+0x2ac/0x550 [ 483.831537] ? prepare_exit_to_usermode+0x350/0x350 [ 483.836537] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 483.841884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 483.846711] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 483.851879] RIP: 0033:0x454e79 [ 483.855052] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 483.862734] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 483.869979] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 483.877224] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 483.884470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 483.891713] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 483.913451] tmpfs: No value for mount option 'rpc_pipefs' [ 483.932220] autofs4:pid:14400:autofs4_fill_super: called with bogus options 2018/03/31 08:51:13 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400)=r8, 0x19) 2018/03/31 08:51:13 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x0, 0x7, 0x6, 0x7f, 0x0, r1, 0x269}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:13 executing program 1: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000001280)='./file0\x00', &(0x7f0000001240)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x901005, &(0x7f00000012c0)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) r1 = gettid() r2 = perf_event_open(&(0x7f0000001040)={0x3, 0x70, 0x401, 0x100, 0x200, 0x10001, 0x0, 0x7f, 0x4002, 0x5, 0x3f, 0x8, 0x6, 0x80000001, 0x0, 0x101, 0x8, 0x400, 0x81, 0x81, 0xff, 0x6, 0x10000, 0x3, 0xfffffffffffffff8, 0xd44, 0x6, 0xff, 0x10000, 0x6, 0xff, 0x5, 0x20000000000000, 0x400, 0x3f, 0x8001, 0x6d, 0x1, 0x0, 0x100, 0x5, @perf_bp={&(0x7f0000001000), 0xd}, 0x8, 0x7, 0xb26, 0x6, 0xfffffffffffffffb, 0x10001, 0x4}, 0x0, 0x3, 0xffffffffffffffff, 0x1) socketpair(0x8, 0xa, 0xa59, &(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000f80)={0x5, 0x70, 0x1000, 0xff3, 0x3, 0x2, 0x0, 0xffffffff, 0x400, 0x1, 0x800, 0x28000000, 0x4, 0x42, 0x400, 0x1, 0x129e, 0x9, 0x4, 0x1, 0x6, 0x7ff, 0xffffffffffffffff, 0xfffffffffffffffa, 0x3, 0x2, 0x6, 0x44e, 0x100000001, 0x0, 0x4, 0x80000001, 0x2, 0x22d5, 0x2, 0x7f, 0x7, 0xffffffffffffffff, 0x0, 0x5, 0x2, @perf_config_ext={0x9, 0x8}, 0x20800, 0x5, 0x0, 0x6, 0xf8a, 0x3}, r1, 0x1, r2, 0x8) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r4, 0x3, 0x8}, 0xc) mount(&(0x7f0000001100)='./file1\x00', &(0x7f0000001140)='./file0\x00', &(0x7f0000001180)='efivarfs\x00', 0x100010, &(0x7f0000002280)="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") socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r6, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x4, 0x7, 0x3, 0x1, 0x0, 0x60a3, 0xa0028, 0x4, 0x81, 0x100000001, 0x7b3, 0x1, 0x8001, 0xfffffffffffffdbf, 0x100000000, 0x80000001, 0x4, 0x10001, 0xffffffffffff8001, 0xa0, 0xff, 0x5, 0xb9df, 0x8, 0x0, 0x66, 0x3, 0x8000, 0x4, 0x80000001, 0x7fc00, 0x400, 0x0, 0x0, 0x5, 0x5, 0x0, 0x7, 0x7, @perf_bp={&(0x7f0000001200), 0x4}, 0x2012, 0x81, 0xffffffff80000001, 0x0, 0x400, 0xff, 0x7}, r1, 0xe, r3, 0x0) socketpair(0x11, 0xf, 0x9, &(0x7f0000000dc0)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000e40)='./file1\x00', &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)='romfs\x00', 0x0, &(0x7f0000000f00)="5e6fef630153044bda3f07aa50bb7a2eca46e16d5f6f7be5fd9ed1b95ff5acb34d18e48a869507ffb4fcaddbe95114538f39c8f361796fba41411ded78bc1058cfa0dc2d0eef23f3ce53296209f6a7f4f056ba3f9053621ea94b0e17041418b3a8f929835fa014f646a8f365dbc9f1") bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000e00)={&(0x7f0000000d80)='./file0\x00', r8}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f00000010c0)={r5}) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='omfs\x00', 0x9c76c0ed26e54935, &(0x7f0000000d00)="06ba1bab3edfdc44c73b6160115f2eb001191c5a600095254c9f89b56293d7e6e31756753f364c3cab9532af379495b5622eb96981e16ccadceda0c7c5f708276c9c083f7d758b8dddb1b3a475a0597477a8") 2018/03/31 08:51:13 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:13 executing program 7 (fault-call:5 fault-nth:21): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:13 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:13 executing program 2: r0 = gettid() socket$kcm(0x29, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f00000008c0)={0x3, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0xfffffffffffffffe, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0x7, 0x5, 0x128, 0x6, 0x4, 0x0, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x8, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x7, 0x1, 0x1004, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000540)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0xe, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={r6, 0x28, &(0x7f0000000740)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={r7, 0x3, 0x18}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f0000000880)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000840)={&(0x7f0000000800)='./file2\x00', r4}, 0x10) 2018/03/31 08:51:13 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) [ 484.185463] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 484.207797] FAULT_INJECTION: forcing a failure. [ 484.207797] name failslab, interval 1, probability 0, space 0, times 0 [ 484.219113] CPU: 1 PID: 14460 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 484.226384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.235734] Call Trace: [ 484.238323] dump_stack+0x194/0x24d [ 484.241954] ? arch_local_irq_restore+0x53/0x53 [ 484.246624] ? __save_stack_trace+0x7e/0xd0 [ 484.250950] should_fail+0x8c0/0xa40 [ 484.254670] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 484.259774] ? kasan_kmalloc+0xad/0xe0 [ 484.263661] ? kmem_cache_alloc_trace+0x136/0x740 [ 484.268504] ? __memcg_init_list_lru_node+0x169/0x270 [ 484.273698] ? __list_lru_init+0x544/0x750 [ 484.277938] ? sget_userns+0x691/0xe40 [ 484.281827] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 484.286576] ? do_mount+0xea4/0x2bb0 [ 484.290284] ? SyS_mount+0xab/0x120 [ 484.293906] ? do_syscall_64+0x281/0x940 [ 484.297968] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 484.303336] ? find_held_lock+0x35/0x1d0 [ 484.307400] ? __lock_is_held+0xb6/0x140 [ 484.311472] ? check_same_owner+0x320/0x320 [ 484.315795] ? rcu_note_context_switch+0x710/0x710 [ 484.320730] should_failslab+0xec/0x120 [ 484.324708] kmem_cache_alloc_trace+0x4b/0x740 [ 484.329290] ? __kmalloc_node+0x33/0x70 [ 484.333258] ? __kmalloc_node+0x33/0x70 [ 484.337237] ? rcu_read_lock_sched_held+0x108/0x120 [ 484.342259] __memcg_init_list_lru_node+0x169/0x270 [ 484.347280] ? list_lru_add+0x7c0/0x7c0 [ 484.351254] ? __kmalloc_node+0x47/0x70 [ 484.355235] __list_lru_init+0x544/0x750 [ 484.359303] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 484.365192] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 484.370213] ? __lockdep_init_map+0xe4/0x650 [ 484.374624] ? lockdep_init_map+0x9/0x10 [ 484.378688] sget_userns+0x691/0xe40 [ 484.382398] ? set_anon_super+0x20/0x20 [ 484.386370] ? put_filp+0x90/0x90 [ 484.389817] ? destroy_unused_super.part.6+0xd0/0xd0 [ 484.394917] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 484.399933] ? trace_hardirqs_off+0x10/0x10 [ 484.404255] ? putname+0xee/0x130 [ 484.407708] ? cap_capable+0x1b5/0x230 [ 484.411606] ? security_capable+0x8e/0xc0 [ 484.415756] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 484.415918] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 484.420936] ? ns_capable_common+0xcf/0x160 [ 484.420951] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 484.420960] mount_ns+0x6d/0x190 [ 484.420972] rpc_mount+0x9e/0xd0 [ 484.420982] mount_fs+0x66/0x2d0 [ 484.451331] vfs_kern_mount.part.26+0xc6/0x4a0 [ 484.455912] ? may_umount+0xa0/0xa0 [ 484.459536] ? _raw_read_unlock+0x22/0x30 [ 484.463699] ? __get_fs_type+0x8a/0xc0 [ 484.467587] do_mount+0xea4/0x2bb0 [ 484.471128] ? copy_mount_string+0x40/0x40 [ 484.475361] ? rcu_pm_notify+0xc0/0xc0 [ 484.479252] ? copy_mount_options+0x5f/0x2e0 2018/03/31 08:51:14 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000c40)={r1, 0x8c3, 0x10}, 0xc) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:14 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000000740)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 484.483655] ? rcu_read_lock_sched_held+0x108/0x120 [ 484.488672] ? kmem_cache_alloc_trace+0x459/0x740 [ 484.492475] tmpfs: No value for mount option 'rpc_pipefs' [ 484.493507] ? kasan_check_write+0x14/0x20 [ 484.493519] ? _copy_from_user+0x99/0x110 [ 484.493533] ? copy_mount_options+0x1f7/0x2e0 [ 484.493551] SyS_mount+0xab/0x120 [ 484.493559] ? copy_mnt_ns+0xb30/0xb30 [ 484.493572] do_syscall_64+0x281/0x940 [ 484.493580] ? vmalloc_sync_all+0x30/0x30 [ 484.493593] ? _raw_spin_unlock_irq+0x27/0x70 [ 484.501059] autofs4:pid:14489:autofs4_fill_super: called with bogus options [ 484.503329] ? finish_task_switch+0x1c1/0x7e0 [ 484.503342] ? syscall_return_slowpath+0x550/0x550 [ 484.503353] ? syscall_return_slowpath+0x2ac/0x550 [ 484.503364] ? prepare_exit_to_usermode+0x350/0x350 [ 484.503377] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 484.503391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 484.503406] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 484.503414] RIP: 0033:0x454e79 [ 484.503418] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/31 08:51:14 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x4, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") recvmsg(r5, &(0x7f0000000840)={&(0x7f0000000740)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/39, 0x27}], 0x1, &(0x7f00000007c0)=""/65, 0x41, 0x8000}, 0x40000040) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 484.503428] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 484.503433] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 484.503438] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 484.503444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 484.503448] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 484.624902] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 08:51:14 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 484.633284] autofs4:pid:14460:autofs4_fill_super: called with bogus options 2018/03/31 08:51:14 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:14 executing program 7 (fault-call:5 fault-nth:22): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)='./file1\x00', &(0x7f0000000c00)='cramfs\x00', 0xc0008, &(0x7f0000000d00)="8bc8972732efb799bcf146271674cb90eb12f5ba51e6fcbf1f57cb1c2df11d54c292c4e4664f7d55a1914d6dc1b344e7a852e8d090948ccbea09547d8f8138f851cfab8a70c01fec80a9fb12e7285d9ca5750801b8af681587926484add84b8eb9c17a31553d2d42ed3b822516c0fa6de5e961fd1790205085048bd9c56a34669c238313702e9822fdb433b1785731c35f8a8711e46088bbf2") sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x1000000000020, &(0x7f0000000c40)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 484.680099] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 484.704061] tmpfs: No value for mount option 'rpc_pipefs' [ 484.711908] autofs4:pid:14489:autofs4_fill_super: called with bogus options 2018/03/31 08:51:14 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:14 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) [ 485.054617] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 485.074190] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 485.082672] FAULT_INJECTION: forcing a failure. [ 485.082672] name failslab, interval 1, probability 0, space 0, times 0 [ 485.096349] CPU: 1 PID: 14539 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 485.103376] tmpfs: No value for mount option 'rpc_pipefs' [ 485.103618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 485.113806] autofs4:pid:14540:autofs4_fill_super: called with bogus options [ 485.118478] Call Trace: [ 485.118497] dump_stack+0x194/0x24d [ 485.118511] ? arch_local_irq_restore+0x53/0x53 [ 485.118525] ? __save_stack_trace+0x7e/0xd0 [ 485.118543] should_fail+0x8c0/0xa40 [ 485.144426] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 485.149508] ? kasan_kmalloc+0xad/0xe0 [ 485.153381] ? kmem_cache_alloc_trace+0x136/0x740 [ 485.158210] ? __memcg_init_list_lru_node+0x169/0x270 [ 485.163374] ? __list_lru_init+0x544/0x750 [ 485.167587] ? sget_userns+0x691/0xe40 [ 485.171454] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 485.176187] ? do_mount+0xea4/0x2bb0 [ 485.179875] ? SyS_mount+0xab/0x120 [ 485.183485] ? do_syscall_64+0x281/0x940 [ 485.187540] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.192881] ? find_held_lock+0x35/0x1d0 [ 485.196919] ? __lock_is_held+0xb6/0x140 [ 485.200959] ? check_same_owner+0x320/0x320 [ 485.205267] ? rcu_note_context_switch+0x710/0x710 [ 485.210174] should_failslab+0xec/0x120 [ 485.214132] kmem_cache_alloc_trace+0x4b/0x740 [ 485.218691] ? __kmalloc_node+0x33/0x70 [ 485.222646] ? __kmalloc_node+0x33/0x70 [ 485.226604] ? rcu_read_lock_sched_held+0x108/0x120 [ 485.231603] __memcg_init_list_lru_node+0x169/0x270 [ 485.236599] ? list_lru_add+0x7c0/0x7c0 [ 485.240549] ? __kmalloc_node+0x47/0x70 [ 485.244517] __list_lru_init+0x544/0x750 [ 485.248561] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 485.254420] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 485.259412] ? __lockdep_init_map+0xe4/0x650 [ 485.263795] ? lockdep_init_map+0x9/0x10 [ 485.267843] sget_userns+0x691/0xe40 [ 485.271541] ? set_anon_super+0x20/0x20 [ 485.275497] ? put_filp+0x90/0x90 [ 485.278941] ? destroy_unused_super.part.6+0xd0/0xd0 [ 485.284028] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 485.289039] ? trace_hardirqs_off+0x10/0x10 [ 485.293347] ? putname+0xee/0x130 [ 485.296779] ? cap_capable+0x1b5/0x230 [ 485.300644] ? security_capable+0x8e/0xc0 [ 485.304772] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 485.309942] ? ns_capable_common+0xcf/0x160 [ 485.314251] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 485.319415] mount_ns+0x6d/0x190 [ 485.322759] rpc_mount+0x9e/0xd0 [ 485.326105] mount_fs+0x66/0x2d0 [ 485.329459] vfs_kern_mount.part.26+0xc6/0x4a0 [ 485.334027] ? may_umount+0xa0/0xa0 [ 485.337647] ? _raw_read_unlock+0x22/0x30 [ 485.341783] ? __get_fs_type+0x8a/0xc0 [ 485.345646] do_mount+0xea4/0x2bb0 [ 485.349167] ? copy_mount_string+0x40/0x40 [ 485.353382] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 485.358384] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 485.363131] ? retint_kernel+0x10/0x10 [ 485.367004] ? copy_mount_options+0x149/0x2e0 [ 485.371482] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 485.376307] ? copy_mount_options+0x1f7/0x2e0 [ 485.380778] SyS_mount+0xab/0x120 [ 485.384214] ? copy_mnt_ns+0xb30/0xb30 [ 485.388088] do_syscall_64+0x281/0x940 [ 485.391951] ? vmalloc_sync_all+0x30/0x30 [ 485.396077] ? _raw_spin_unlock_irq+0x27/0x70 [ 485.400560] ? finish_task_switch+0x1c1/0x7e0 [ 485.405049] ? syscall_return_slowpath+0x550/0x550 [ 485.409961] ? syscall_return_slowpath+0x2ac/0x550 [ 485.414879] ? prepare_exit_to_usermode+0x350/0x350 [ 485.419882] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 485.425244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 485.430077] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 485.435248] RIP: 0033:0x454e79 [ 485.438420] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 485.446128] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 2018/03/31 08:51:15 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300), &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 485.453381] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 485.460627] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 485.467875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 485.475136] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 [ 485.493768] tmpfs: No value for mount option 'rpc_pipefs' [ 485.501489] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 485.501648] autofs4:pid:14539:autofs4_fill_super: called with bogus options [ 485.526374] tmpfs: No value for mount option 'rpc_pipefs' [ 485.538426] autofs4:pid:14540:autofs4_fill_super: called with bogus options 2018/03/31 08:51:15 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:15 executing program 7 (fault-call:5 fault-nth:23): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:15 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x8, 0x7, 0x7, 0xfffffffffffffffa, 0x1, r4, 0x8}, 0x2c) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:15 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:15 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300), &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:15 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:15 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c80)={&(0x7f0000000c40)='./file1\x00', 0x0, 0x8}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x4, 0x4, &(0x7f0000000080)=@raw=[@generic={0x0, 0x46, 0xa1}, @alu={0x0, 0x7fffffff, 0xb, 0x7, 0xf, 0x0, 0x10}], &(0x7f0000000dc0)="47504cfa", 0x2, 0x12, &(0x7f00000002c0)=""/18, 0x4000000000, 0x5}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={0x0, r2, 0x5, 0x1}, 0x14) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r4, &(0x7f0000000480)={0x0, 0x3dc, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x1, &(0x7f0000000d40)=""/77, 0x4d, 0xf377}, 0x0) recvmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x10, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0x11}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0xfffffffffffffda6, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/154, 0x9a}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) close(r3) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000)}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r5, 0x0, [0x115]}, 0x2c) socketpair(0x0, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r6, &(0x7f0000000300)="486a3f43530145dff631b0713cc8aeb9a438ff763daba62c0260181af7bbd55c2cfc1e59bf40d30fedc309d828a323eb962e8f7ecc29db3841ad9a6d88bfbbe8bd0dafbc5b2502bfc8f8a3f2460287e31a5c59aafa740da8af8814d5724e31b94f6fbd0f", &(0x7f00000004c0)=""/185}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r8, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000cc0)) 2018/03/31 08:51:15 executing program 0: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r5}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x1d1) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000740)={r5}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000006c0)={r5, r6}) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001880)={r7, &(0x7f0000000780)="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", &(0x7f0000001780)=""/240}, 0x18) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001900)={&(0x7f00000018c0)='./file2\x00', 0x0, 0x18}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 485.951220] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 485.952132] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 485.972241] tmpfs: No value for mount option 'rpc_pipefs' [ 485.982767] autofs4:pid:14584:autofs4_fill_super: called with bogus options [ 486.005837] FAULT_INJECTION: forcing a failure. [ 486.005837] name failslab, interval 1, probability 0, space 0, times 0 [ 486.017257] CPU: 1 PID: 14583 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 486.024534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.033886] Call Trace: [ 486.036479] dump_stack+0x194/0x24d [ 486.040117] ? arch_local_irq_restore+0x53/0x53 [ 486.044788] ? __save_stack_trace+0x7e/0xd0 [ 486.049118] should_fail+0x8c0/0xa40 [ 486.052837] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 486.057940] ? kasan_kmalloc+0xad/0xe0 [ 486.061828] ? kmem_cache_alloc_trace+0x136/0x740 [ 486.066668] ? __memcg_init_list_lru_node+0x169/0x270 [ 486.071854] ? __list_lru_init+0x544/0x750 [ 486.076089] ? sget_userns+0x691/0xe40 [ 486.079981] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 486.084738] ? do_mount+0xea4/0x2bb0 [ 486.088450] ? SyS_mount+0xab/0x120 [ 486.092074] ? do_syscall_64+0x281/0x940 [ 486.096146] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.102071] ? find_held_lock+0x35/0x1d0 [ 486.106227] ? __lock_is_held+0xb6/0x140 [ 486.110300] ? check_same_owner+0x320/0x320 [ 486.114623] ? rcu_note_context_switch+0x710/0x710 [ 486.119558] should_failslab+0xec/0x120 [ 486.123534] kmem_cache_alloc_trace+0x4b/0x740 [ 486.128116] ? __kmalloc_node+0x33/0x70 [ 486.132101] __memcg_init_list_lru_node+0x169/0x270 [ 486.137122] ? list_lru_add+0x7c0/0x7c0 [ 486.141097] ? __kmalloc_node+0x47/0x70 [ 486.145078] __list_lru_init+0x544/0x750 [ 486.149145] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 486.155033] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 486.160053] ? __lockdep_init_map+0xe4/0x650 [ 486.164463] ? lockdep_init_map+0x9/0x10 [ 486.168532] sget_userns+0x691/0xe40 [ 486.172242] ? set_anon_super+0x20/0x20 [ 486.176217] ? put_filp+0x90/0x90 [ 486.179670] ? destroy_unused_super.part.6+0xd0/0xd0 [ 486.184775] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 486.189804] ? trace_hardirqs_off+0x10/0x10 [ 486.194122] ? putname+0xee/0x130 [ 486.197577] ? cap_capable+0x1b5/0x230 [ 486.201471] ? security_capable+0x8e/0xc0 [ 486.205622] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 486.210809] ? ns_capable_common+0xcf/0x160 [ 486.215131] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 486.220317] mount_ns+0x6d/0x190 [ 486.223683] rpc_mount+0x9e/0xd0 [ 486.227049] mount_fs+0x66/0x2d0 [ 486.230419] vfs_kern_mount.part.26+0xc6/0x4a0 [ 486.235000] ? may_umount+0xa0/0xa0 [ 486.238623] ? _raw_read_unlock+0x22/0x30 [ 486.242771] ? __get_fs_type+0x8a/0xc0 [ 486.246655] do_mount+0xea4/0x2bb0 [ 486.250199] ? copy_mount_string+0x40/0x40 [ 486.254432] ? rcu_pm_notify+0xc0/0xc0 [ 486.258324] ? copy_mount_options+0x5f/0x2e0 [ 486.262727] ? rcu_read_lock_sched_held+0x108/0x120 [ 486.267746] ? kmem_cache_alloc_trace+0x459/0x740 [ 486.272598] ? kasan_check_write+0x14/0x20 [ 486.276836] ? copy_mount_options+0x1f7/0x2e0 [ 486.281330] SyS_mount+0xab/0x120 [ 486.284777] ? copy_mnt_ns+0xb30/0xb30 [ 486.288663] do_syscall_64+0x281/0x940 [ 486.292545] ? vmalloc_sync_all+0x30/0x30 [ 486.296689] ? _raw_spin_unlock_irq+0x27/0x70 [ 486.301186] ? finish_task_switch+0x1c1/0x7e0 [ 486.305678] ? syscall_return_slowpath+0x550/0x550 [ 486.310607] ? syscall_return_slowpath+0x2ac/0x550 [ 486.315538] ? prepare_exit_to_usermode+0x350/0x350 [ 486.320557] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 486.325919] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 486.330768] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 486.335948] RIP: 0033:0x454e79 [ 486.339132] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 486.346839] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 486.354108] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 486.361376] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 486.368637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 486.375903] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 486.396717] tmpfs: No value for mount option 'rpc_pipefs' [ 486.403631] autofs4:pid:14583:autofs4_fill_super: called with bogus options [ 486.936751] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 486.942825] tmpfs: No value for mount option 'rpc_pipefs' [ 486.957142] autofs4:pid:14625:autofs4_fill_super: called with bogus options 2018/03/31 08:51:16 executing program 6: r0 = gettid() socket$kcm(0x29, 0x1000, 0x0) socketpair(0xa, 0x80a, 0xc881, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000740)={0x5, 0x70, 0x5, 0x539, 0x3, 0x1, 0x0, 0xe35e, 0x28000, 0x3, 0x800, 0x8001, 0xfffffffffffffffb, 0x0, 0x5, 0xffffffffffff8001, 0x3, 0x61, 0x5776, 0x0, 0x6, 0x5, 0x9, 0x5, 0x2, 0x3, 0x6, 0x6, 0x0, 0x2, 0xfffffffffffffff9, 0x800, 0xfff, 0x8, 0x384e, 0x4f543207, 0x40, 0x0, 0x0, 0x2, 0x6, @perf_config_ext={0x8000800000, 0xfffffffffffffffb}, 0x200, 0x9, 0x6, 0x4, 0x7f, 0x44, 0x1000}, r0, 0x6, r1, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) socketpair(0x5, 0x3, 0x7ff, &(0x7f00000008c0)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)='ubifs\x00', 0x2000, &(0x7f0000000840)="8dfaa2da2709f4d88ad42d65ad0e9a575ca56e47ff8325abe8d8f973f0997e130a4aef33161e4ec7dec8d0bc75ed386e0e05661b3fa7dae5583a175daac8846e1b5103be4e6f72e7283e6d9c199afa3019b3d07d255bb887547b529237129135738c877b0c49290dd497d9c5b2f31278") setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400)=r8, 0x19) 2018/03/31 08:51:16 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300), &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:16 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:16 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:16 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000740)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000680)='./file0/file0\x00', r1}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:16 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:16 executing program 7 (fault-call:5 fault-nth:24): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001400)={&(0x7f0000000d00)=@nfc, 0x80, &(0x7f0000001200)=[{&(0x7f0000000d80)=""/118, 0x76}, {&(0x7f0000000e00)=""/201, 0xc9}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/247, 0xf7}, {&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000001000)=""/125, 0x7d}, {&(0x7f0000001080)}, {&(0x7f00000010c0)=""/22, 0x16}, {&(0x7f0000001100)=""/245, 0xf5}], 0x9, &(0x7f00000012c0)=""/112, 0x70, 0x8}, 0x2000) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r2, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001540)={&(0x7f0000001080)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)={&(0x7f0000000c40)='./file0/bus\x00'}, 0x10) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 487.085118] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 487.105993] FAULT_INJECTION: forcing a failure. [ 487.105993] name failslab, interval 1, probability 0, space 0, times 0 [ 487.117313] CPU: 0 PID: 14641 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 487.124580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.133919] Call Trace: [ 487.136496] dump_stack+0x194/0x24d [ 487.140105] ? arch_local_irq_restore+0x53/0x53 [ 487.144761] should_fail+0x8c0/0xa40 [ 487.148469] ? is_bpf_text_address+0xa4/0x120 [ 487.152942] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 487.158030] ? __kernel_text_address+0xd/0x40 [ 487.162521] ? unwind_get_return_address+0x61/0xa0 [ 487.167436] ? find_held_lock+0x35/0x1d0 [ 487.171481] ? __lock_is_held+0xb6/0x140 [ 487.175534] ? check_same_owner+0x320/0x320 [ 487.179849] ? rcu_note_context_switch+0x710/0x710 [ 487.184767] should_failslab+0xec/0x120 [ 487.188728] kmem_cache_alloc_trace+0x4b/0x740 [ 487.193295] ? __kmalloc_node+0x33/0x70 [ 487.197252] ? __kmalloc_node+0x33/0x70 [ 487.201211] ? rcu_read_lock_sched_held+0x108/0x120 [ 487.206217] __memcg_init_list_lru_node+0x169/0x270 [ 487.211222] ? list_lru_add+0x7c0/0x7c0 [ 487.215184] ? __kmalloc_node+0x47/0x70 [ 487.219135] __list_lru_init+0x544/0x750 [ 487.223187] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 487.229061] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 487.234068] ? lockdep_init_map+0x9/0x10 [ 487.238123] sget_userns+0x6b1/0xe40 [ 487.241822] ? set_anon_super+0x20/0x20 [ 487.245783] ? put_filp+0x90/0x90 [ 487.249232] ? destroy_unused_super.part.6+0xd0/0xd0 [ 487.254326] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 487.259335] ? trace_hardirqs_off+0x10/0x10 [ 487.263649] ? putname+0xee/0x130 [ 487.267100] ? cap_capable+0x1b5/0x230 [ 487.271062] ? security_capable+0x8e/0xc0 [ 487.275191] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 487.280367] ? ns_capable_common+0xcf/0x160 [ 487.284680] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 487.289849] mount_ns+0x6d/0x190 [ 487.293205] rpc_mount+0x9e/0xd0 [ 487.296563] mount_fs+0x66/0x2d0 [ 487.299914] vfs_kern_mount.part.26+0xc6/0x4a0 [ 487.304480] ? may_umount+0xa0/0xa0 [ 487.308095] ? _raw_read_unlock+0x22/0x30 [ 487.312232] ? __get_fs_type+0x8a/0xc0 [ 487.316110] do_mount+0xea4/0x2bb0 [ 487.319636] ? copy_mount_string+0x40/0x40 [ 487.323853] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 487.328849] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 487.334291] ? retint_kernel+0x10/0x10 [ 487.338164] ? copy_mount_options+0x18b/0x2e0 [ 487.342642] ? copy_mount_options+0x196/0x2e0 [ 487.347112] ? copy_mount_options+0x1f7/0x2e0 [ 487.351582] SyS_mount+0xab/0x120 [ 487.355014] ? copy_mnt_ns+0xb30/0xb30 [ 487.358891] do_syscall_64+0x281/0x940 [ 487.362759] ? vmalloc_sync_all+0x30/0x30 [ 487.366882] ? _raw_spin_unlock_irq+0x27/0x70 [ 487.371358] ? finish_task_switch+0x1c1/0x7e0 [ 487.375837] ? syscall_return_slowpath+0x550/0x550 [ 487.380751] ? syscall_return_slowpath+0x2ac/0x550 [ 487.385663] ? prepare_exit_to_usermode+0x350/0x350 [ 487.390661] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 487.396010] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 487.400849] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 487.406022] RIP: 0033:0x454e79 [ 487.409198] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 487.416890] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 487.424144] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 487.431402] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 487.438649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 487.445894] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 487.493449] tmpfs: No value for mount option 'rpc_pipefs' [ 487.503967] autofs4:pid:14641:autofs4_fill_super: called with bogus options 2018/03/31 08:51:17 executing program 7 (fault-call:5 fault-nth:25): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:17 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 487.687394] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 487.711096] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 08:51:17 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:17 executing program 0: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r5}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x19) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000740)={r1}) 2018/03/31 08:51:17 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:17 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r3, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r3, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)) [ 487.742615] autofs4:pid:14668:autofs4_fill_super: called with bogus options [ 487.777211] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 487.792148] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 08:51:17 executing program 6: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) mount(&(0x7f0000000140)='./file1/file0\x00', &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000740)='pipefs\x00', 0x10, &(0x7f0000000780)="b953e7708019e9ffb03eadad16c6476f811f788fc7e8e471a0edb81fe0da216b717f7886403a0144401c4755125115e2c75a67241790ec152e863f7c8ed2fc8c1077ef15d68f6105ed92a1b43a6e4e0780f061c124d4faeddfc89124b394df498fab9b3f6c4134ed4339eedc214739191cdce4da1fbf0539b0fe4aba9eef8d53a80d840abfca44c33305c61aa2896a9ff1c9429a4b4a344b404f28a83d18850aa82743e9216b05e1062fde908f1d6237a3dd4541") ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r7, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r3}, 0x3e4) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000680)=r7, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) recvmsg(r1, &(0x7f0000006d80)={&(0x7f0000006640)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000006cc0)=[{&(0x7f00000066c0)=""/198, 0xc6}, {&(0x7f00000067c0)=""/248, 0xf8}, {&(0x7f00000068c0)=""/34, 0x22}, {&(0x7f0000006900)=""/255, 0xff}, {&(0x7f0000006a00)=""/39, 0x27}, {&(0x7f0000006a40)=""/120, 0x78}, {&(0x7f0000006ac0)=""/211, 0xd3}, {&(0x7f0000006bc0)=""/230, 0xe6}], 0x8, &(0x7f0000006d40)=""/53, 0x35, 0x7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000006dc0)={0x3, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000600000000000000090000001800000006000000000000000600000005fe0000d5000000000000000000000018150000", @ANYRES32=r6, @ANYBLOB="0000bc0000000000fb864000fdffffff000000000000000077950000fd001100000000000000000000009500000000000000"], &(0x7f00000008c0)='GPL\x00', 0x4, 0x16, &(0x7f0000000900)=""/22, 0x40f00, 0x1, [], r8}, 0x48) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) socketpair(0x5, 0xc0003, 0x6, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x32, &(0x7f0000000400)=r9, 0x19) 2018/03/31 08:51:17 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") socketpair(0x8, 0x0, 0x5, &(0x7f0000000c80)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000cc0)={&(0x7f0000000c40)='./file0/bus\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0xfffffe83, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r2, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 487.814548] autofs4:pid:14668:autofs4_fill_super: called with bogus options [ 487.862150] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 487.875904] FAULT_INJECTION: forcing a failure. [ 487.875904] name failslab, interval 1, probability 0, space 0, times 0 [ 487.887235] CPU: 0 PID: 14683 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 487.894503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.903844] Call Trace: [ 487.906413] dump_stack+0x194/0x24d [ 487.910027] ? arch_local_irq_restore+0x53/0x53 [ 487.914674] ? __save_stack_trace+0x7e/0xd0 [ 487.918988] should_fail+0x8c0/0xa40 [ 487.922683] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 487.927762] ? kasan_kmalloc+0xad/0xe0 [ 487.931622] ? kmem_cache_alloc_trace+0x136/0x740 [ 487.936438] ? __memcg_init_list_lru_node+0x169/0x270 [ 487.941600] ? __list_lru_init+0x544/0x750 [ 487.945808] ? sget_userns+0x6b1/0xe40 [ 487.949671] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 487.954402] ? do_mount+0xea4/0x2bb0 [ 487.958091] ? SyS_mount+0xab/0x120 [ 487.961697] ? do_syscall_64+0x281/0x940 [ 487.965732] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 487.971073] ? find_held_lock+0x35/0x1d0 [ 487.975123] ? __lock_is_held+0xb6/0x140 [ 487.979174] ? check_same_owner+0x320/0x320 [ 487.983472] ? rcu_note_context_switch+0x710/0x710 [ 487.988381] should_failslab+0xec/0x120 [ 487.992344] kmem_cache_alloc_trace+0x4b/0x740 [ 487.996903] ? __kmalloc_node+0x33/0x70 [ 488.000853] ? __kmalloc_node+0x33/0x70 [ 488.004803] ? rcu_read_lock_sched_held+0x108/0x120 [ 488.009805] __memcg_init_list_lru_node+0x169/0x270 [ 488.014813] ? list_lru_add+0x7c0/0x7c0 [ 488.018764] ? __kmalloc_node+0x47/0x70 [ 488.022722] __list_lru_init+0x544/0x750 [ 488.026764] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 488.032643] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 488.037648] ? lockdep_init_map+0x9/0x10 [ 488.041692] sget_userns+0x6b1/0xe40 [ 488.045380] ? set_anon_super+0x20/0x20 [ 488.049416] ? put_filp+0x90/0x90 [ 488.052851] ? destroy_unused_super.part.6+0xd0/0xd0 [ 488.057933] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 488.062931] ? trace_hardirqs_off+0x10/0x10 [ 488.067231] ? putname+0xee/0x130 [ 488.070662] ? cap_capable+0x1b5/0x230 [ 488.074524] ? security_capable+0x8e/0xc0 [ 488.078648] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 488.083813] ? ns_capable_common+0xcf/0x160 [ 488.088112] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 488.093277] mount_ns+0x6d/0x190 [ 488.096627] rpc_mount+0x9e/0xd0 [ 488.099993] mount_fs+0x66/0x2d0 [ 488.103341] vfs_kern_mount.part.26+0xc6/0x4a0 [ 488.107905] ? may_umount+0xa0/0xa0 [ 488.111519] ? _raw_read_unlock+0x22/0x30 [ 488.115651] ? __get_fs_type+0x8a/0xc0 [ 488.119523] do_mount+0xea4/0x2bb0 [ 488.123041] ? copy_mount_string+0x40/0x40 [ 488.127251] ? rcu_pm_notify+0xc0/0xc0 [ 488.131117] ? copy_mount_options+0x5f/0x2e0 [ 488.135500] ? rcu_read_lock_sched_held+0x108/0x120 [ 488.140490] ? kmem_cache_alloc_trace+0x459/0x740 [ 488.145314] ? kasan_check_write+0x14/0x20 [ 488.149532] ? _copy_from_user+0x99/0x110 [ 488.153654] ? copy_mount_options+0x1f7/0x2e0 [ 488.158136] SyS_mount+0xab/0x120 [ 488.161560] ? copy_mnt_ns+0xb30/0xb30 [ 488.165425] do_syscall_64+0x281/0x940 [ 488.169285] ? vmalloc_sync_all+0x30/0x30 [ 488.173408] ? _raw_spin_unlock_irq+0x27/0x70 [ 488.177880] ? finish_task_switch+0x1c1/0x7e0 [ 488.182348] ? syscall_return_slowpath+0x550/0x550 [ 488.187253] ? syscall_return_slowpath+0x2ac/0x550 [ 488.192156] ? prepare_exit_to_usermode+0x350/0x350 [ 488.197233] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 488.202574] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 488.207398] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 488.212559] RIP: 0033:0x454e79 [ 488.215721] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 488.223403] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 488.230654] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 488.237907] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 488.245155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 488.252399] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/31 08:51:18 executing program 7 (fault-call:5 fault-nth:26): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 488.265689] tmpfs: No value for mount option 'rpc_pipefs' [ 488.272177] autofs4:pid:14683:autofs4_fill_super: called with bogus options 2018/03/31 08:51:18 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:18 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) [ 488.571695] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 488.599728] tmpfs: No value for mount option 'rpc_pipefs' 2018/03/31 08:51:18 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 488.616202] autofs4:pid:14712:autofs4_fill_super: called with bogus options [ 488.643794] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 488.650069] tmpfs: No value for mount option 'rpc_pipefs' [ 488.668849] autofs4:pid:14712:autofs4_fill_super: called with bogus options [ 488.694860] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 488.719078] FAULT_INJECTION: forcing a failure. [ 488.719078] name failslab, interval 1, probability 0, space 0, times 0 [ 488.730449] CPU: 1 PID: 14726 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 488.738336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.747687] Call Trace: [ 488.750275] dump_stack+0x194/0x24d [ 488.753908] ? arch_local_irq_restore+0x53/0x53 [ 488.758592] should_fail+0x8c0/0xa40 [ 488.762312] ? is_bpf_text_address+0xa4/0x120 [ 488.766812] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 488.771923] ? __kernel_text_address+0xd/0x40 [ 488.776431] ? unwind_get_return_address+0x61/0xa0 [ 488.781463] ? find_held_lock+0x35/0x1d0 [ 488.785535] ? __lock_is_held+0xb6/0x140 [ 488.789610] ? check_same_owner+0x320/0x320 [ 488.793941] ? rcu_note_context_switch+0x710/0x710 [ 488.798881] should_failslab+0xec/0x120 [ 488.802865] kmem_cache_alloc_trace+0x4b/0x740 [ 488.807447] ? __kmalloc_node+0x33/0x70 [ 488.811428] ? __kmalloc_node+0x33/0x70 [ 488.815411] ? rcu_read_lock_sched_held+0x108/0x120 [ 488.820445] __memcg_init_list_lru_node+0x169/0x270 [ 488.825648] ? list_lru_add+0x7c0/0x7c0 [ 488.829626] ? __kmalloc_node+0x47/0x70 [ 488.833603] __list_lru_init+0x544/0x750 [ 488.837667] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 488.843553] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 488.848573] ? lockdep_init_map+0x9/0x10 [ 488.852635] sget_userns+0x6b1/0xe40 [ 488.856346] ? set_anon_super+0x20/0x20 [ 488.860310] ? put_filp+0x90/0x90 [ 488.863746] ? destroy_unused_super.part.6+0xd0/0xd0 [ 488.868836] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 488.873837] ? trace_hardirqs_off+0x10/0x10 [ 488.878143] ? putname+0xee/0x130 [ 488.881582] ? cap_capable+0x1b5/0x230 [ 488.885455] ? security_capable+0x8e/0xc0 [ 488.889596] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 488.894765] ? ns_capable_common+0xcf/0x160 [ 488.899068] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 488.904237] mount_ns+0x6d/0x190 [ 488.907585] rpc_mount+0x9e/0xd0 [ 488.910933] mount_fs+0x66/0x2d0 [ 488.914281] vfs_kern_mount.part.26+0xc6/0x4a0 [ 488.918840] ? may_umount+0xa0/0xa0 [ 488.922449] ? _raw_read_unlock+0x22/0x30 [ 488.926577] ? __get_fs_type+0x8a/0xc0 [ 488.930449] do_mount+0xea4/0x2bb0 [ 488.933975] ? copy_mount_string+0x40/0x40 [ 488.938190] ? rcu_pm_notify+0xc0/0xc0 [ 488.942066] ? copy_mount_options+0x5f/0x2e0 [ 488.946456] ? rcu_read_lock_sched_held+0x108/0x120 [ 488.951453] ? kmem_cache_alloc_trace+0x459/0x740 [ 488.956276] ? kasan_check_write+0x14/0x20 [ 488.960493] ? copy_mount_options+0x1f7/0x2e0 [ 488.964972] SyS_mount+0xab/0x120 [ 488.968406] ? copy_mnt_ns+0xb30/0xb30 [ 488.972275] do_syscall_64+0x281/0x940 [ 488.976141] ? vmalloc_sync_all+0x30/0x30 [ 488.980285] ? _raw_spin_unlock_irq+0x27/0x70 [ 488.984758] ? finish_task_switch+0x1c1/0x7e0 [ 488.989236] ? syscall_return_slowpath+0x550/0x550 [ 488.994143] ? syscall_return_slowpath+0x2ac/0x550 [ 488.999055] ? prepare_exit_to_usermode+0x350/0x350 [ 489.004052] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 489.009400] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.014227] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.019399] RIP: 0033:0x454e79 [ 489.022566] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 489.030270] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 489.037518] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 489.044765] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 489.052019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 489.059272] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 489.103441] tmpfs: No value for mount option 'rpc_pipefs' [ 489.109999] autofs4:pid:14726:autofs4_fill_super: called with bogus options 2018/03/31 08:51:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0/bus\x00', 0x0, 0x10}, 0x10) mount(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000cc0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000d00)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:19 executing program 7 (fault-call:5 fault-nth:27): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:19 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r3, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r3, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)) 2018/03/31 08:51:19 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000280)=0x3b) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") socketpair(0xd, 0x80000, 0x100000001, &(0x7f0000000140)) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:19 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:19 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:19 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:19 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000980)) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000140)='./file0\x00', 0x20) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r3}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f0000000900)='./file0/file0/file0\x00', &(0x7f0000000780)='./file0\x00', &(0x7f0000000840)="63696633009ad59a2c3dfbe2de4b333bc450dfd4655afc2f7db50be1846a3d03023c2cea6275f310df40f30882ed31b43868fc0f0b7d94bdb32a9b8e8d762241368cb18ff9cb314218c1365cafd3fc2e84125f85354e486f05d3404517a74b61dce482f6d6c20f285e90677884833c8f56ffc0d0e36885b587617c29b6717bb39a2761644b17b3840f5b6064add58b441f60", 0x40, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 489.393307] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 489.417845] tmpfs: No value for mount option '@' [ 489.428117] autofs4:pid:14767:autofs4_fill_super: called with bogus options [ 489.453984] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 489.474071] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 489.488757] FAULT_INJECTION: forcing a failure. [ 489.488757] name failslab, interval 1, probability 0, space 0, times 0 2018/03/31 08:51:19 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r3, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r3, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)) [ 489.501199] CPU: 1 PID: 14771 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 489.508468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 489.517817] Call Trace: [ 489.520409] dump_stack+0x194/0x24d [ 489.524035] ? arch_local_irq_restore+0x53/0x53 [ 489.528700] ? __save_stack_trace+0x7e/0xd0 [ 489.533032] should_fail+0x8c0/0xa40 [ 489.536750] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 489.541858] ? kasan_kmalloc+0xad/0xe0 [ 489.545744] ? kmem_cache_alloc_trace+0x136/0x740 [ 489.546883] tmpfs: No value for mount option '@' [ 489.550581] ? __memcg_init_list_lru_node+0x169/0x270 [ 489.550592] ? __list_lru_init+0x544/0x750 [ 489.550602] ? sget_userns+0x6b1/0xe40 [ 489.550613] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 489.550620] ? do_mount+0xea4/0x2bb0 [ 489.550627] ? SyS_mount+0xab/0x120 [ 489.550639] ? do_syscall_64+0x281/0x940 [ 489.550650] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.550665] ? find_held_lock+0x35/0x1d0 [ 489.550677] ? __lock_is_held+0xb6/0x140 [ 489.550693] ? check_same_owner+0x320/0x320 [ 489.602700] ? rcu_note_context_switch+0x710/0x710 [ 489.607643] should_failslab+0xec/0x120 [ 489.611624] kmem_cache_alloc_trace+0x4b/0x740 [ 489.616208] ? __kmalloc_node+0x33/0x70 [ 489.620179] ? __kmalloc_node+0x33/0x70 [ 489.624153] ? rcu_read_lock_sched_held+0x108/0x120 [ 489.629172] __memcg_init_list_lru_node+0x169/0x270 [ 489.634193] ? list_lru_add+0x7c0/0x7c0 [ 489.638167] ? __kmalloc_node+0x47/0x70 [ 489.642144] __list_lru_init+0x544/0x750 [ 489.646216] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 2018/03/31 08:51:19 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af2", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:19 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c80)={&(0x7f0000000c40)='./file1\x00', 0x0, 0x10}, 0x10) [ 489.652097] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 489.657116] ? lockdep_init_map+0x9/0x10 [ 489.661178] sget_userns+0x6b1/0xe40 [ 489.664886] ? set_anon_super+0x20/0x20 [ 489.668856] ? put_filp+0x90/0x90 [ 489.672308] ? destroy_unused_super.part.6+0xd0/0xd0 [ 489.677411] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 489.682426] ? trace_hardirqs_off+0x10/0x10 [ 489.686741] ? putname+0xee/0x130 [ 489.690191] ? cap_capable+0x1b5/0x230 [ 489.694081] ? security_capable+0x8e/0xc0 [ 489.698232] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 489.703528] ? ns_capable_common+0xcf/0x160 [ 489.707848] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 489.713039] mount_ns+0x6d/0x190 [ 489.716402] rpc_mount+0x9e/0xd0 [ 489.719765] mount_fs+0x66/0x2d0 [ 489.723131] vfs_kern_mount.part.26+0xc6/0x4a0 [ 489.727711] ? may_umount+0xa0/0xa0 [ 489.731342] ? _raw_read_unlock+0x22/0x30 [ 489.735495] ? __get_fs_type+0x8a/0xc0 [ 489.739386] do_mount+0xea4/0x2bb0 [ 489.742930] ? copy_mount_string+0x40/0x40 [ 489.747159] ? rcu_pm_notify+0xc0/0xc0 [ 489.751048] ? copy_mount_options+0x5f/0x2e0 2018/03/31 08:51:19 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000980)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) mount(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000740)='ubifs\x00', 0x10000, &(0x7f0000000780)="3aada920fca40dc59aa37f460e1d71cf12820688e5873a54ba6c36cb7aaa894b8a7a943c972fa1d2a99ef93efa71ea07e2a59548ad4e1fc2c4e8588774b68930840c10d5b39a5412d5fb7716427901e2ed566fa6eeda0de27619b5ec17203647a8065ae29effd02c1b916a722645a4f778dc9e3071c0932aaeea7034681f3c12f0da22cf5bc7a8ce7160066ca574d0267bf7569db3139ef977ba0b6d2d5f3828c405af86ef342c79705f37dbbd2109ee") setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) perf_event_open(&(0x7f0000000a00)={0x5, 0x70, 0x9, 0x1, 0x7, 0x6, 0x0, 0x4, 0x200, 0x6, 0x7, 0x5, 0x3a19, 0x3f, 0x200, 0x8, 0x8, 0x7f, 0x0, 0x8001, 0x200, 0x7fff, 0x3, 0x1f, 0x7, 0x8, 0x1f, 0x0, 0x4, 0x6, 0x6, 0xffffffff, 0x9, 0x15c5, 0x80, 0x100000001, 0x8000, 0xfffffffffffffff8, 0x0, 0xa94b, 0x0, @perf_bp={&(0x7f00000009c0), 0x1}, 0x200, 0x1, 0x0, 0x5, 0xce, 0x800, 0x3f}, r0, 0x4, r6, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) mount(&(0x7f0000000840)='./file0\x00', &(0x7f0000000880)='./file0/file0\x00', &(0x7f00000008c0)='ext2\x00', 0xc00, &(0x7f0000000900)="4685da4a5fad5ba2514c8733341a20d3c678eb5df1fc30bb495369ea3e01f67c8bffd2289995914b1689349ddb9f9d044219f99cb1db46b754d8095b27384cac27261aa8a909ea3c21ae6ae2") setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r8, 0x19) [ 489.755455] ? rcu_read_lock_sched_held+0x108/0x120 [ 489.760468] ? kmem_cache_alloc_trace+0x459/0x740 [ 489.765309] ? kasan_check_write+0x14/0x20 [ 489.769549] ? copy_mount_options+0x1f7/0x2e0 [ 489.774068] SyS_mount+0xab/0x120 [ 489.777530] ? copy_mnt_ns+0xb30/0xb30 [ 489.781423] do_syscall_64+0x281/0x940 [ 489.785308] ? vmalloc_sync_all+0x30/0x30 [ 489.789540] ? _raw_spin_unlock_irq+0x27/0x70 [ 489.794030] ? finish_task_switch+0x1c1/0x7e0 [ 489.798525] ? syscall_return_slowpath+0x550/0x550 [ 489.803454] ? syscall_return_slowpath+0x2ac/0x550 [ 489.808385] ? prepare_exit_to_usermode+0x350/0x350 [ 489.813403] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 489.818766] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 489.823613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 489.828799] RIP: 0033:0x454e79 [ 489.831986] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 489.839689] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 489.846952] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/03/31 08:51:19 executing program 0: r0 = gettid() socket$kcm(0x29, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:19 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 489.854217] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 489.861480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 489.868746] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 489.908662] tmpfs: No value for mount option 'rpc_pipefs' [ 489.925503] autofs4:pid:14771:autofs4_fill_super: called with bogus options 2018/03/31 08:51:19 executing program 7 (fault-call:5 fault-nth:28): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:19 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af2", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:19 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:19 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 490.058173] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 490.096447] tmpfs: No value for mount option 'rpc_pipefs' [ 490.107609] autofs4:pid:14831:autofs4_fill_super: called with bogus options [ 490.139139] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/03/31 08:51:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000cc0)='./file0/bus\x00', &(0x7f0000000e00)='./file0/bus\x00', &(0x7f0000000dc0)="ff070900d535884f2bbc", 0x0, &(0x7f0000000d40)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 490.154682] tmpfs: No value for mount option 'rpc_pipefs' [ 490.163058] autofs4:pid:14831:autofs4_fill_super: called with bogus options [ 490.236421] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 490.256011] FAULT_INJECTION: forcing a failure. [ 490.256011] name failslab, interval 1, probability 0, space 0, times 0 [ 490.267392] CPU: 1 PID: 14857 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 490.274668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 490.284034] Call Trace: [ 490.286627] dump_stack+0x194/0x24d [ 490.290256] ? arch_local_irq_restore+0x53/0x53 [ 490.294924] ? __save_stack_trace+0x7e/0xd0 [ 490.299254] should_fail+0x8c0/0xa40 [ 490.302969] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 490.308075] ? kasan_kmalloc+0xad/0xe0 [ 490.311961] ? kmem_cache_alloc_trace+0x136/0x740 [ 490.316802] ? __memcg_init_list_lru_node+0x169/0x270 [ 490.322166] ? __list_lru_init+0x544/0x750 [ 490.326402] ? sget_userns+0x6b1/0xe40 [ 490.330292] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 490.335047] ? do_mount+0xea4/0x2bb0 [ 490.338756] ? SyS_mount+0xab/0x120 [ 490.342382] ? do_syscall_64+0x281/0x940 [ 490.346440] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 490.351806] ? find_held_lock+0x35/0x1d0 [ 490.355872] ? __lock_is_held+0xb6/0x140 [ 490.359942] ? check_same_owner+0x320/0x320 [ 490.364270] ? rcu_note_context_switch+0x710/0x710 [ 490.369209] should_failslab+0xec/0x120 [ 490.373183] kmem_cache_alloc_trace+0x4b/0x740 [ 490.377762] ? __kmalloc_node+0x33/0x70 [ 490.381732] ? __kmalloc_node+0x33/0x70 [ 490.385709] ? rcu_read_lock_sched_held+0x108/0x120 [ 490.390732] __memcg_init_list_lru_node+0x169/0x270 [ 490.395751] ? list_lru_add+0x7c0/0x7c0 [ 490.399727] ? __kmalloc_node+0x47/0x70 [ 490.403710] __list_lru_init+0x544/0x750 [ 490.407777] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 490.413671] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 490.418697] ? lockdep_init_map+0x9/0x10 [ 490.422759] sget_userns+0x6b1/0xe40 [ 490.426470] ? set_anon_super+0x20/0x20 [ 490.430441] ? put_filp+0x90/0x90 [ 490.433893] ? destroy_unused_super.part.6+0xd0/0xd0 [ 490.439008] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 490.444024] ? trace_hardirqs_off+0x10/0x10 [ 490.448354] ? putname+0xee/0x130 [ 490.451804] ? cap_capable+0x1b5/0x230 [ 490.455697] ? security_capable+0x8e/0xc0 [ 490.459843] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 490.465036] ? ns_capable_common+0xcf/0x160 [ 490.469367] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 490.474557] mount_ns+0x6d/0x190 [ 490.477928] rpc_mount+0x9e/0xd0 [ 490.481295] mount_fs+0x66/0x2d0 [ 490.484684] vfs_kern_mount.part.26+0xc6/0x4a0 [ 490.489275] ? may_umount+0xa0/0xa0 [ 490.492908] ? _raw_read_unlock+0x22/0x30 [ 490.497062] ? __get_fs_type+0x8a/0xc0 [ 490.500953] do_mount+0xea4/0x2bb0 [ 490.504495] ? copy_mount_string+0x40/0x40 [ 490.508725] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 490.513743] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 490.518499] ? retint_kernel+0x10/0x10 [ 490.522388] ? copy_mount_options+0x18b/0x2e0 [ 490.526882] ? audit_kill_trees+0x430/0x430 [ 490.531202] ? copy_mount_options+0x1f7/0x2e0 [ 490.535701] SyS_mount+0xab/0x120 [ 490.539148] ? copy_mnt_ns+0xb30/0xb30 [ 490.543032] do_syscall_64+0x281/0x940 [ 490.546913] ? vmalloc_sync_all+0x30/0x30 [ 490.551057] ? _raw_spin_unlock_irq+0x27/0x70 [ 490.555551] ? finish_task_switch+0x1c1/0x7e0 [ 490.560048] ? syscall_return_slowpath+0x550/0x550 [ 490.564973] ? syscall_return_slowpath+0x2ac/0x550 [ 490.569888] ? prepare_exit_to_usermode+0x350/0x350 [ 490.574887] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 490.580232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 490.585062] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 490.590231] RIP: 0033:0x454e79 [ 490.593398] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 490.601086] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 490.608341] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 490.615589] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 490.622850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 490.630097] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 490.641093] tmpfs: No value for mount option 'rpc_pipefs' [ 490.649444] autofs4:pid:14857:autofs4_fill_super: called with bogus options [ 490.661782] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 490.693201] tmpfs: No value for mount option 'rpc_pipefs' [ 490.699809] autofs4:pid:14874:autofs4_fill_super: called with bogus options 2018/03/31 08:51:20 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:20 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af2", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:20 executing program 6: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) perf_event_open(&(0x7f0000000dc0)={0x1, 0x70, 0xdd, 0x7, 0x0, 0xfffffffffffffffc, 0x0, 0x9, 0x1000, 0x2, 0x800, 0x4, 0x5cbe, 0x0, 0x3, 0x5, 0x1, 0xcc4, 0x6, 0x3ff, 0x1, 0xe10d, 0x5, 0x7fff, 0x6fa0000000, 0x5, 0xfffffffffffffffd, 0x7, 0x7, 0x9, 0x0, 0x8, 0xffffffff, 0x101, 0x8, 0xfffffffffffffff8, 0x800, 0x3, 0x0, 0x3, 0x7, @perf_bp={&(0x7f0000000d80), 0x5}, 0x1000, 0x32dc, 0x80, 0x7, 0x6, 0x7fffffff, 0x5}, r0, 0x0, r5, 0x8) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) sendmsg(r1, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000140)="373b7634595da65de2ff12bdf77a08a83d1488f56d852ce9de8a8ad8391815a7b312c54fdb49e1262d", 0x29}, {&(0x7f0000000740)="f58739769f7c1df3e93b91a1e3b3669262119445e3e8b3f2a583613df1f3ff070778bb3ce7789c8608fe95cd233fa2dd5d952d76cfdec99d21a4e2bdc1c473abb05acc3f79b3638fa15818afc2f5a2b659796a5c8ff140f5e6977bce7d7dfff0bc49ed50efaf55f2f6cc0887c6ca8058927806be7aa37e6fa064d20cf56a0b495ec3c12799ed3376aed4204ea0ac80ccebc2f9829f8dc8b28c6117fe5152233fa068dce49429a25a", 0xa8}, {&(0x7f0000000800)="8599cd538333d9731cde3a368338f6557166f0feec7d73c1f34b30e28862c8e866e5c0f15c450d68a4c3524e7c994239888e95a7cd96cab3486cbaa5c33a485cf2f337a9f888475ad21aa5ac7f2d82921f6073a13263943461506253da38dff88453cc624e4f12d7758cc3aab822927819a7eb54af62c7a4351dcc9d5c8a74fc69509d6e696292bc7fafc5e9816e2a8f5dc1f732822cb200a6f6dca49cd6a79a6a5f23bc10dae982ec83c3c91d581225cafd03d2512a651723ff551461f7db79ff244209f03a14c98f9342d7bd158d53064048fe91cdd8b92822c22f6c9bdda79c66fc940b91", 0xe6}, {&(0x7f0000000280)="e963b5", 0x3}, {&(0x7f0000000900)="744ce3953302019654486d44084b7bbe731739a84d543b", 0x17}], 0x5, &(0x7f00000009c0)=[{0x50, 0x10e, 0x2, "650758a24946cbc8d75b95aebf66b4a3e30ec8825f3ae0e3d3b3120c468af0dea2b8ecea9586818b7c6939144bce7082e151b3edd099af837a1bf89e"}, {0x40, 0x0, 0xfff, "d1b2559777d0c5fc05d8aecc8b3ca64cfd6848f7923f42783f185dd35ec4e883bfbb0af042e40094ba24dd052b2eb678"}, {0xf8, 0x109, 0x6, "d1a2c7339d8027590cc427ecd97177dcafbc479f82bd5b66ca164da9ee69ecb1f17c918dc464066222f88bffe1bc0793a4c6aeb06964b43bf95c07e70807067a3db7f0184111f8b2cf06770bde5dc61322202a80ebdcee62052ff8018bcc8d3fc0645e2b7040bcec2e43631718bcb9cc65935729a4b8efceb3c9d3fa8b70a50b930725ca532b72d47c41750e75e8adc944edce2223a1d943cf95d5392d2e071975ef04338ea898a4a5fa4c003fbc38c5fef058996b61714484ff08c6dcfe5ad299e0a206110f3917605fb022400fb4b3895beeaa40f222a4ee9090cefb09bb52763f9ecb"}, {0x30, 0x117, 0x6, "a20a60a5fd1ec5ba09f6ec647f5d3ebe7e43cd43b373adf9c580"}, {0xd8, 0x119, 0x6, "da702c26c8822c276ad36c06f309fb0f2fe9d2e55190c81b78a1842749e4364448f4dc1377ded8aebc36b7044e80ac4bb10360cb2c58711728a443927b03e48e555e82a3a3b5317fcb608c4d885571e4185c03188fef09fb0c9c9d627328aa20881a3c4b293ed8b2072c3570cfde976396297bcf1d06f2b21ee85b834c1f0ab8492fbb8e403b640f844dcc8a7600d08535cdb4f079926bf15705a5c80cafb6dceb983e200a9c8d08af7a18b4091c5b32f35930c0a9de888d4a83855016937ae734debb9c"}, {0xd0, 0x13e, 0x9, "e1fd37f10bbafaff833f5035afac9f603fc2fd05589dedc103c1bf630a80ad1892e8b34b3c9473559d93a90d2f00251ff6a14346a848fb47ad3dd896e5461d0d2e8198b95df77ad7c49f3a99680cccb7c89b6b8f1fe2bad8bfaeb8e3fd6661420aa30ddd60d333e9c9f1a1364cbe735db277dfb9d8385ec1d06c31b8d4774da5abc1f3dfa9fdb079596ca4d203293812b8849a195f7e5a0557a5fa06891464a43bad4c7f42ad4b3764b2e8e93c0373a54514008e2f0b1762f99a26"}], 0x360, 0x8000}, 0x800) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x7}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400)=r8, 0x19) 2018/03/31 08:51:20 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:20 executing program 7 (fault-call:5 fault-nth:29): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:20 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)={0x1f, 0xffffffff, 0x9b, 0x0, 0x2, 0xffffffffffffff9c, 0x80}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000dc0)={r0, 0x28, &(0x7f0000000d80)}, 0x10) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000c80)={0xffffffffffffff9c, 0x28, &(0x7f0000000c40)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={r1, 0xfffffffffffffff9, 0x6}, 0xfffffffffffffff8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r2}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") socketpair(0x4, 0x2, 0x10000000000003, &(0x7f0000000f00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000ec0)=0xffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r2, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r4, 0x3, 0x8}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000d00)={r2, &(0x7f0000002280)="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"}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x2, 0x288158ff289936b1, 0x9, &(0x7f0000000e00)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000e80)=ANY=[@ANYBLOB="020000000000000f0000000004000000d61d124c547a4a9ceb12a40eb04812f13e224875d4480fb3e87c76c6bb19649920430151ce3dc30f8daa"]) sendmsg(r5, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000cc0)) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:20 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:20 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) sendmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000740)=@llc={0x1a, 0x108, 0xc000000000000000, 0xb1, 0xffffffffffffffe1, 0x7, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000980)=[{&(0x7f00000007c0)="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", 0xfc}, {&(0x7f00000008c0)="aee45707f496f210efb6deb3b76213a43a2aa08d692ace73832324daf3", 0x1d}, {&(0x7f0000000900)="a92daa0ad9d92dcaf581f332c6d4cd3b2adc04670c97c44006c6770c9ec9bf1d8bd23fb0054501bbafa5acce9aefa28390f4236699b3e2e3d1726bb0a844c6c5ee2a31c5f9d55900eeec73402a412beb461fd2", 0x53}], 0x3, &(0x7f00000009c0)=[{0xf8, 0x1, 0xfffffffffffffff7, "b9d5a1395ae43bfb6d694f5e164af1a8c4ece23dd94462fc649597c8b65ae11b172d33a8092623386e854c4a883b485b47fbfbdf5268418282debe1117db55dcd15f1cf15e1289f03be6fa281df909dc268a0407ed0aad27b4fc0b4e9103a45f590e28f1bac8a94d020470ec55ec85fbd044b28658a038f039ef55ff357361f9749fc3049874e948b7802f56018b51d4e02219713145b77729dcab017021233f3225bb27ae73e8e08a4ccd4dd9e48117d8702129b22dceb4a77803647a84264c1519dcdfde93e6db72d8440748ec807b67a73c4861bb6858b17d731d70c2c145d52e8c"}, {0xa8, 0x0, 0x4, "18a89d71599a5dd8cdf7e1ec8ec0e6edf72f9106adf37faeb466fd594d728e3983ad4c7b400574c73e679667b3e884b2e5bbbe751f5496c8c6209aa5f7ad04097fcb90d67b17b115bc2cca6251e597f27954a0592bd13a95e4035baf772d97fb7e779e53bcfb91a19cf2076ebc5d6dee1906ed1256ddaec2086d458c4c01fecc084bb6867b4e5db1b992d282c4c2488bd3e3ba"}, {0x10, 0x198, 0x9}, {0x70, 0x1ff, 0x4, "6c33d2d3200ac8802fc8a730aed4da00e181923ea61262752ab9b9e876d7ea785d712302a03ad71ff3cb632afdfb83ba16a2f1f889f29b5f7838a3338fe3aae9082df0475e0eef99158b935055515a69a03352d12724d5ea10582cda"}, {0x20, 0x118, 0x3, "cbf11a874567b1a624ace1"}, {0xf8, 0x119, 0x4, "ba4c2a3e6014e99ad84d6c6a06134524cc836852175894524dd55e41061478fc617a027e766a19b5b2c49156c4a549770f9286ca513d58d81cba7f8ba04aa3e834bcf593341424b214d05a58285e35eb85d7ee75d80bbb83380bafb2ff381b87076a69a922e4c9b426e967ceb3aff667d7ddcb4108100cd1c71b3e019f040b6d55279b2dab73ebc4382e06020bdda0a51918b6b365579550cbddfc30528436b5b1ded688d60c301395e3066c709d1c738292c4d9eee949c70f889c0b1bd279230463ee34731016d7655a82663b237cd1181dd79a2b185e2f7c9832ee11b286bcd907cd7a3615a1"}, {0x18, 0x105, 0x1, "a0c329776f92"}, {0xe0, 0x10f, 0xffffffff7fffffff, "25e5742e9ddb1912e60d69d67ba1279d17a51c328658c8d311425ba6e035dc1acf8a7604140e1b336f936057bfb6cb968725fd315e4f35ebf1227e176ef17e158a372b5007aec12c7f1ff8584f31164305c24ea85f604b9b5d9d2674531c3fa15e5cbea13ff681cf079500e1a7a110615727ed497fb7bfe2e564c5b394a1401c269f028626677469d2d999ef70b0d7135a436e6a3bd682c2fe9c7f3c9821877211d245af57b9f0530e00463e22f76b2389d5d8385f4c6981bacd4fd6055414889b37751caaca2ca43736bf"}, {0xa8, 0x100, 0xffffffff, "06431582290b97909b34075eeb32508761b31dd95ab76bade2cd5cb8a7e04a8557dc81b45f207d77ada1d5e1b668a7f2c642972c9fdbf5910416e2c8d76db89077798a1fb09d655f4b10a545956390944761e99cd6acfc319046ba02dc482c39e40644c8c03ba0acd98faeb3f96b3d2a405072368a2fbe939e5f253e51df1c057bf2b67707b3a47a6f7757ef5d26f5ccca52afa3c2f2"}], 0x4d8, 0x800}, 0x40000) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 490.752828] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 490.772306] tmpfs: No value for mount option 'rpc_pipefs' [ 490.779666] autofs4:pid:14874:autofs4_fill_super: called with bogus options [ 490.993297] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 491.009831] FAULT_INJECTION: forcing a failure. [ 491.009831] name failslab, interval 1, probability 0, space 0, times 0 [ 491.021138] CPU: 1 PID: 14905 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 491.028412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.037871] Call Trace: [ 491.040462] dump_stack+0x194/0x24d [ 491.044096] ? arch_local_irq_restore+0x53/0x53 [ 491.048764] ? __save_stack_trace+0x7e/0xd0 [ 491.053095] should_fail+0x8c0/0xa40 [ 491.056812] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 491.061918] ? kasan_kmalloc+0xad/0xe0 [ 491.065804] ? kmem_cache_alloc_trace+0x136/0x740 [ 491.070643] ? __memcg_init_list_lru_node+0x169/0x270 [ 491.075840] ? __list_lru_init+0x544/0x750 [ 491.080070] ? sget_userns+0x6b1/0xe40 [ 491.083957] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 491.088708] ? do_mount+0xea4/0x2bb0 2018/03/31 08:51:20 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 491.092420] ? SyS_mount+0xab/0x120 [ 491.096049] ? do_syscall_64+0x281/0x940 [ 491.100116] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 491.105486] ? find_held_lock+0x35/0x1d0 [ 491.109546] ? __lock_is_held+0xb6/0x140 [ 491.113620] ? check_same_owner+0x320/0x320 [ 491.117945] ? rcu_note_context_switch+0x710/0x710 [ 491.122882] should_failslab+0xec/0x120 [ 491.126859] kmem_cache_alloc_trace+0x4b/0x740 [ 491.131440] ? __kmalloc_node+0x33/0x70 [ 491.135414] ? __kmalloc_node+0x33/0x70 [ 491.139378] ? rcu_read_lock_sched_held+0x108/0x120 [ 491.144390] __memcg_init_list_lru_node+0x169/0x270 [ 491.149408] ? list_lru_add+0x7c0/0x7c0 [ 491.153385] ? __kmalloc_node+0x47/0x70 [ 491.157363] __list_lru_init+0x544/0x750 [ 491.161424] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 491.167311] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 491.172428] ? lockdep_init_map+0x9/0x10 [ 491.176491] sget_userns+0x6b1/0xe40 [ 491.180204] ? set_anon_super+0x20/0x20 [ 491.184179] ? put_filp+0x90/0x90 [ 491.187633] ? destroy_unused_super.part.6+0xd0/0xd0 2018/03/31 08:51:21 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000780)={&(0x7f0000000740)='./file1\x00', r6}, 0x10) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 491.192736] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 491.197752] ? trace_hardirqs_off+0x10/0x10 [ 491.202073] ? putname+0xee/0x130 [ 491.205527] ? cap_capable+0x1b5/0x230 [ 491.209416] ? security_capable+0x8e/0xc0 [ 491.213564] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 491.218754] ? ns_capable_common+0xcf/0x160 [ 491.223076] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 491.228258] mount_ns+0x6d/0x190 [ 491.231623] rpc_mount+0x9e/0xd0 [ 491.234989] mount_fs+0x66/0x2d0 [ 491.238355] vfs_kern_mount.part.26+0xc6/0x4a0 [ 491.242935] ? may_umount+0xa0/0xa0 [ 491.246561] ? _raw_read_unlock+0x22/0x30 [ 491.250706] ? __get_fs_type+0x8a/0xc0 [ 491.254596] do_mount+0xea4/0x2bb0 [ 491.258136] ? copy_mount_string+0x40/0x40 [ 491.262369] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 491.267383] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 491.272144] ? retint_kernel+0x10/0x10 [ 491.276038] ? copy_mount_options+0x149/0x2e0 [ 491.280535] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 491.285376] ? copy_mount_options+0x1f7/0x2e0 [ 491.289874] SyS_mount+0xab/0x120 2018/03/31 08:51:21 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d32", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) [ 491.293327] ? copy_mnt_ns+0xb30/0xb30 [ 491.297214] do_syscall_64+0x281/0x940 [ 491.301095] ? vmalloc_sync_all+0x30/0x30 [ 491.305241] ? _raw_spin_unlock_irq+0x27/0x70 [ 491.309732] ? finish_task_switch+0x1c1/0x7e0 [ 491.314221] ? syscall_return_slowpath+0x550/0x550 [ 491.319144] ? syscall_return_slowpath+0x2ac/0x550 [ 491.324069] ? prepare_exit_to_usermode+0x350/0x350 [ 491.329081] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 491.334443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 491.339291] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/31 08:51:21 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 491.342310] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 491.344471] RIP: 0033:0x454e79 [ 491.344477] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 491.344488] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 491.344493] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 491.344498] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 491.344504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 491.344509] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 491.362537] tmpfs: No value for mount option 'rpc_pipefs' [ 491.425726] autofs4:pid:14905:autofs4_fill_super: called with bogus options [ 491.426591] tmpfs: No value for mount option 'rpc_pipefs' [ 491.442394] autofs4:pid:14922:autofs4_fill_super: called with bogus options [ 491.497653] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 491.516190] tmpfs: No value for mount option 'rpc_pipefs' [ 491.522857] autofs4:pid:14936:autofs4_fill_super: called with bogus options 2018/03/31 08:51:21 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:21 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:21 executing program 7 (fault-call:5 fault-nth:30): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000002}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f0000000c40)='./file1\x00', &(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='gfs2\x00', 0x8000, &(0x7f0000000d00)="2942e0d203dbd5824874fdf4baab769bb53c9d6f39ae0a29a44963b39e3c292875285c1b8cc6aeb6a4b3e4adf875b610ac358759aa32fb2e1f0f41e0a167f27460f99400d400036394a3631ef30aca0a1d205dc755dc8ea7e6d75c9bab1c761e152a0b883e507450cb3d3de2d76081448ba5bf2fd5acb47b4968cdcd592bb6e65302395bfbb3aa973d8224e35399d18d6cf626912699043a6f844f6fafc5a9fb3ce4d0494c5e2d92024a0757feda70f35b4d1f73946abd4c9716ff72aea771ac") mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:21 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000780)=r7, 0xfffffffffffffd99) 2018/03/31 08:51:21 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:21 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d32", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:21 executing program 0: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r5}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x889) recvmsg(r1, &(0x7f0000000e40)={&(0x7f0000000740)=@vsock={0x0, 0x0, 0x0, @host}, 0x80, &(0x7f0000000d40)=[{&(0x7f00000007c0)=""/31, 0x1f}, {&(0x7f0000000800)=""/165, 0xa5}, {&(0x7f00000008c0)=""/20, 0x14}, {&(0x7f0000000900)=""/118, 0x76}, {&(0x7f0000000980)=""/205, 0xcd}, {&(0x7f0000000a80)=""/102, 0x66}, {&(0x7f0000000b00)=""/11, 0xb}, {&(0x7f0000000b40)=""/126, 0x7e}, {&(0x7f0000000bc0)=""/130, 0x82}, {&(0x7f0000000c80)=""/150, 0x96}], 0xa, &(0x7f0000000e00)=""/33, 0x21, 0x8}, 0x12100) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) socketpair$inet6(0xa, 0x1, 0x7, &(0x7f0000000e80)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x19) [ 491.811259] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 491.820930] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 491.823854] FAULT_INJECTION: forcing a failure. [ 491.823854] name failslab, interval 1, probability 0, space 0, times 0 [ 491.840237] tmpfs: No value for mount option 'rpc_pipefs' [ 491.844365] CPU: 1 PID: 14974 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 491.844372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 491.844376] Call Trace: [ 491.844395] dump_stack+0x194/0x24d [ 491.844407] ? arch_local_irq_restore+0x53/0x53 [ 491.844416] ? __save_stack_trace+0x7e/0xd0 [ 491.844431] should_fail+0x8c0/0xa40 [ 491.851862] autofs4:pid:14973:autofs4_fill_super: called with bogus options [ 491.857215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 491.857227] ? kasan_kmalloc+0xad/0xe0 [ 491.857235] ? kmem_cache_alloc_trace+0x136/0x740 [ 491.857245] ? __memcg_init_list_lru_node+0x169/0x270 [ 491.857252] ? __list_lru_init+0x544/0x750 [ 491.857261] ? sget_userns+0x6b1/0xe40 [ 491.857271] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 491.857278] ? do_mount+0xea4/0x2bb0 [ 491.857283] ? SyS_mount+0xab/0x120 [ 491.857293] ? do_syscall_64+0x281/0x940 [ 491.857309] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 491.857321] ? find_held_lock+0x35/0x1d0 [ 491.900204] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 491.901475] ? __lock_is_held+0xb6/0x140 [ 491.901494] ? check_same_owner+0x320/0x320 [ 491.901508] ? rcu_note_context_switch+0x710/0x710 [ 491.901523] should_failslab+0xec/0x120 [ 491.901533] kmem_cache_alloc_trace+0x4b/0x740 [ 491.901541] ? __kmalloc_node+0x33/0x70 [ 491.901548] ? __kmalloc_node+0x33/0x70 [ 491.901561] ? rcu_read_lock_sched_held+0x108/0x120 [ 491.916566] tmpfs: No value for mount option 'rpc_pipefs' [ 491.919640] __memcg_init_list_lru_node+0x169/0x270 [ 491.919653] ? list_lru_add+0x7c0/0x7c0 [ 491.919663] ? __kmalloc_node+0x47/0x70 [ 491.919676] __list_lru_init+0x544/0x750 [ 491.919688] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 491.919700] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 491.919713] ? lockdep_init_map+0x9/0x10 [ 491.919724] sget_userns+0x6b1/0xe40 [ 491.919731] ? set_anon_super+0x20/0x20 [ 491.919742] ? put_filp+0x90/0x90 [ 491.919754] ? destroy_unused_super.part.6+0xd0/0xd0 [ 491.929208] autofs4:pid:14973:autofs4_fill_super: called with bogus options [ 491.931797] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 491.931812] ? trace_hardirqs_off+0x10/0x10 [ 491.931824] ? putname+0xee/0x130 [ 491.931838] ? cap_capable+0x1b5/0x230 [ 491.931851] ? security_capable+0x8e/0xc0 [ 491.931863] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 491.931874] ? ns_capable_common+0xcf/0x160 [ 491.931884] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 491.931894] mount_ns+0x6d/0x190 [ 492.089803] rpc_mount+0x9e/0xd0 [ 492.093165] mount_fs+0x66/0x2d0 [ 492.097112] vfs_kern_mount.part.26+0xc6/0x4a0 [ 492.101677] ? may_umount+0xa0/0xa0 [ 492.105286] ? _raw_read_unlock+0x22/0x30 [ 492.109416] ? __get_fs_type+0x8a/0xc0 [ 492.113286] do_mount+0xea4/0x2bb0 [ 492.116814] ? copy_mount_string+0x40/0x40 [ 492.121036] ? rcu_pm_notify+0xc0/0xc0 [ 492.124911] ? copy_mount_options+0x5f/0x2e0 [ 492.129299] ? rcu_read_lock_sched_held+0x108/0x120 [ 492.134297] ? kmem_cache_alloc_trace+0x459/0x740 [ 492.139127] ? copy_mount_options+0x1f7/0x2e0 [ 492.143603] SyS_mount+0xab/0x120 [ 492.147039] ? copy_mnt_ns+0xb30/0xb30 [ 492.150917] do_syscall_64+0x281/0x940 [ 492.154782] ? vmalloc_sync_all+0x30/0x30 [ 492.158911] ? _raw_spin_unlock_irq+0x27/0x70 [ 492.163386] ? finish_task_switch+0x1c1/0x7e0 [ 492.167861] ? syscall_return_slowpath+0x550/0x550 [ 492.172771] ? syscall_return_slowpath+0x2ac/0x550 [ 492.177682] ? prepare_exit_to_usermode+0x350/0x350 [ 492.182676] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 492.188027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 492.192855] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.198027] RIP: 0033:0x454e79 [ 492.201199] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 492.208888] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 492.216134] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 492.223383] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 492.230629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 492.237877] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/31 08:51:22 executing program 1: mkdir(&(0x7f0000000c80)='./file0\x00', 0x2) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="a3ce050d6f1a6f500f9faf081f32708b49b8fa6273255b1cf034a1355a4dd87ee9dab776547845c67009daf55c215bc657d4bdced9995339c9656c0354b644fbe8b2557633b91724f2eb4b00182f530928e30c28ce65d66f3ab88f54c5758ad9ea29154cbc20239fc626ed80b5856a9268794bffa7dd1e12162493d57d9289bd05201583b3574883512297e15117104cc52a3a9aa78b23abda223d651bc199658f5cdf2e3563e69ad8b37d462d74d08f8eb28746eba92d1846d290c409f086452f39e27ef8dc484a0b76e37599bfcbbff8d1954d7abdaec3496bc76e895a2c94bdebadec5b1518d36ee85f265c6c9213230c9b26ecc2be9f04dc98faca3d3750e422680989551a6555e905280c4eb44f28fb113f7db30ac8584b4eef85bfab7cadc1d442397b58ffbe43645732b64f3b59077613359e6a90a76547226e4b6180fd5feb59bcd47781712b599c9ca71036dd0cd57ec6f2338d555c10affce767fcf874a3e119efa339f80718493f5aab21dc22036e39f39f0fbf113b33fd38bd4b92aaf2fbd3a06b85bcfa951ef4ea3c3e79c0a1e7164e9a0e1863bf947c21e98202affc03e1a749b982ec8493e784d44c6fbfbbe51393efee20547acb1e0e96d14cba142b9613b6775c97d404c9402ffb3be93850363fca18f6287572ba7ac4409777cc51e8c27744e530ebc2563c5048354359d033321e986dc5b365c5fe26d0cd1ea1f912b60b38d62aecf65ca8331a5725b5b6ec7123851a2d1ddb20d625991438a727c55853d83453ed9191790b7dec5a40bf40dc809782fbd51f18a25a43bf502faf6a76bb2775821193c701c80deeb7eae939a42e3a50acb8055650dfb304e31945983643432c056430e16d73b0b5f2d71607750b946d9a3c739617d995fb949957e77fba0f199a07985458fe141f5078cb9526da34eb29fee9d538e524f1ce37d5a12e738cfa6464d7c4d02a12650fd7ca68b817837211404909715ebf76840c78053633b6150dd4305088a1fe4a97b9bb09b425cd9cef6c529752fd351b506deba77fc21b3b8e0ac789cac68a6bd11174dc0c6e526622960683f0a2e0a414718f3419cdf64bea0ce0da958eb48255658ca23fcf510b67eef5e6e3ed63543aa3ad9335bb2efcfea2b79aec961d6baa8522e5741b9c44fcc277ebbe0ec8689a479bd559b0ee7fe122328cabb57d4f5b771c712915c0030e7ddcd0fe51ac3056c1733f540a842456d4c4530b9f08ae162296f9a2fe9b8f7af4eaef8de92171893511915f74cad7d2f16f29e653329d72a8cff6510f627560bc75e3b5d8fb740ba934a00ca74b6044c59b90e56ec330c64cfdc8d5bcc9e80a1361bf2ccd238608f0f1b90cf10f8b8b5a80a3b5923be179f2456ba545f3c75041d2680ed333a83d938d5c743ae2c8310e603cd39176f6bc388439418ddb7ffa2386e8734dc93a67d4f31b25c5f03eeab67d8b583c11a05ffa84222308ed4ac5b62aef7067da6f9781fc9f59b72be8e06bb73616de294c8c8adaec5e4db25772705c315f2c2e9438fb6de55db800cd30bf19b33c06430bc16b7acef3f11db43247e730b27b839cf05589d27c61eceaef04d9840419a9d1e50dade563da25b24131f49b78a4b441553ee8ee4c7b33ef7c0b8664fa0ad67cb24876ed11f6f6c6adf1091184291283cd211245b27885e487f48476abc3c7b35ef4e3d9cf46f8f818491beb709873a64a0ce4340b18e8ce4d3bf5ce33dc82165e1ff767c5a05faac7fff1977c4a8ed07ad1d9c426b55e8dcfe9962b6623f284200928b337a9250bc71ae39921f882452d92d9b2acce8840e3d2e7571385b2d811323dab33a938027f33bfeeea18b396acd8ffbb56da1dfb1ff507b3906eb27228538ab0c526531b5532020a334bf97aba773259af7989416139fa27f8ea98ffa6acd87953af1e2264374309561cab587d509f949ce93c08c013217dbf67fed8027cf7c9a2ce6c53d8e5ebbc71676de37593a1e2a191d62354f9cce032960f5ec678235c0ae9c030b2f3f74473c37271c34e1dcf9d0076d8e8df7eb4c701796efae9933b5b727c936263c582c857f41d74d23437e3546a4eccdd9d278b794789c9e1058732a7a763c3382a82b8544e0b4b6fb057db8f78319b3729d8ebafe7017949c82bd4882abf4a44cc4c036197fd2d55a9355b830a6ad162abc908e42949912b5aaf6e75b7925444921324360cbbc903eb499d4334c35dffd7748125fa2d89f144a50149a16e3df15d1586c416ef05b6b0feeba8ef8529b56ed69baa41b6b23eb174e78bf98364e8216e74c22400d49ac8fe3f43ed09d8e1c29b4667bc0b520273c39d893402beeb0292e49ad69559fe1c5180cdb64cbf901b019b9ab4fa6e507f003053e94994b12b2c0d602b4759345d80150ab7f0efcba7334bb7cf34dc3e1d10c1bbb4a920cf1030304b9e69c384bc109d475c6c973be8c99b7129d92b21b897110806ac80c17816cb3fba9cc8b1cf52036697246f499c258c8ed00054c15dc24dd2552523a549ad02fd32b4238b8f7ba3596db1b4cebb780fca15f6f2102f797c537b22b4ed4e1c617b8b7355765f66c7574405cd4912c5f0a74c6bdac16bb0eafcedfcc24f9753be0ff674ff63b66a5a60d77057d31cc438794837f82e69e7a811b4b6a00d4e8fce1eef6e488cf15e426fcbdc564c4034f4279a36321246fba777466d3d98d0adb4f9fe69e352bdc99dbb8553f8c69f9300960cffe8e4afe277d4e80c7ec19a4f4d94146f71a0aa2f79b9954b828fd92416a660d1f431aeb02f342d1b2732d5fe50f70f4c857cd2b9fafec375bc424dcf982e23a0e6bb4d5ede099a355282f85a") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) mkdir(&(0x7f0000000080)='./file0/bus/file0\x00', 0x40) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x4, 0x9}, 0xffffffffffffff62) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 492.258795] tmpfs: No value for mount option 'rpc_pipefs' [ 492.281169] autofs4:pid:14974:autofs4_fill_super: called with bogus options 2018/03/31 08:51:22 executing program 7 (fault-call:5 fault-nth:31): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:22 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:22 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:22 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:22 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d32", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:22 executing program 6: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) r7 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000740)={0x7, 0x70, 0x5, 0x8, 0x8, 0x31, 0x0, 0x8b, 0x5, 0x4, 0xfffffffffffffff8, 0x8, 0x3, 0x0, 0x8, 0x3, 0x76e34fd9, 0x7, 0x8, 0x1f, 0x3, 0x2, 0x9, 0x7, 0x7, 0x1, 0x0, 0xffff, 0xfffffffffffffff9, 0x10001, 0x9, 0x2, 0x100, 0xfffffffffffffffc, 0xda, 0x1, 0x20, 0x1f6, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000140), 0x6}, 0x10, 0x2, 0x1f, 0x1, 0x9, 0xce07, 0x5}, r0, 0xf, r7, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r8, 0x19) [ 492.636521] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 492.656135] tmpfs: No value for mount option 'rpc_pipefs' [ 492.662634] autofs4:pid:15011:autofs4_fill_super: called with bogus options [ 492.693808] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 492.694661] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 492.708262] FAULT_INJECTION: forcing a failure. [ 492.708262] name failslab, interval 1, probability 0, space 0, times 0 [ 492.721547] tmpfs: No value for mount option 'rpc_pipefs' [ 492.726883] CPU: 0 PID: 15015 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 492.726893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 492.735403] autofs4:pid:15011:autofs4_fill_super: called with bogus options [ 492.739662] Call Trace: [ 492.739682] dump_stack+0x194/0x24d [ 492.739695] ? arch_local_irq_restore+0x53/0x53 [ 492.739707] ? __save_stack_trace+0x7e/0xd0 [ 492.739726] should_fail+0x8c0/0xa40 [ 492.739739] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 492.739751] ? kasan_kmalloc+0xad/0xe0 [ 492.739762] ? kmem_cache_alloc_trace+0x136/0x740 [ 492.788761] ? __memcg_init_list_lru_node+0x169/0x270 [ 492.793954] ? __list_lru_init+0x544/0x750 [ 492.798181] ? sget_userns+0x6b1/0xe40 [ 492.802063] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 492.806809] ? do_mount+0xea4/0x2bb0 [ 492.810500] ? SyS_mount+0xab/0x120 [ 492.814106] ? do_syscall_64+0x281/0x940 [ 492.818146] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 492.823492] ? find_held_lock+0x35/0x1d0 [ 492.827535] ? __lock_is_held+0xb6/0x140 [ 492.831584] ? check_same_owner+0x320/0x320 [ 492.835888] ? rcu_note_context_switch+0x710/0x710 [ 492.840803] should_failslab+0xec/0x120 [ 492.844756] kmem_cache_alloc_trace+0x4b/0x740 [ 492.849320] ? __kmalloc_node+0x33/0x70 [ 492.853272] ? __kmalloc_node+0x33/0x70 [ 492.857224] ? rcu_read_lock_sched_held+0x108/0x120 [ 492.862224] __memcg_init_list_lru_node+0x169/0x270 [ 492.867221] ? list_lru_add+0x7c0/0x7c0 [ 492.871178] ? __kmalloc_node+0x47/0x70 [ 492.875139] __list_lru_init+0x544/0x750 [ 492.879183] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 492.885050] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 492.890053] ? lockdep_init_map+0x9/0x10 [ 492.894093] sget_userns+0x6b1/0xe40 [ 492.897784] ? set_anon_super+0x20/0x20 [ 492.901737] ? put_filp+0x90/0x90 [ 492.905172] ? destroy_unused_super.part.6+0xd0/0xd0 [ 492.910269] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 492.915269] ? trace_hardirqs_off+0x10/0x10 [ 492.919574] ? putname+0xee/0x130 [ 492.923011] ? cap_capable+0x1b5/0x230 [ 492.926886] ? security_capable+0x8e/0xc0 [ 492.931022] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 492.936194] ? ns_capable_common+0xcf/0x160 [ 492.940497] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 492.945663] mount_ns+0x6d/0x190 [ 492.949013] rpc_mount+0x9e/0xd0 [ 492.952364] mount_fs+0x66/0x2d0 [ 492.955798] vfs_kern_mount.part.26+0xc6/0x4a0 [ 492.960359] ? may_umount+0xa0/0xa0 [ 492.963963] ? _raw_read_unlock+0x22/0x30 [ 492.968091] ? __get_fs_type+0x8a/0xc0 [ 492.971960] do_mount+0xea4/0x2bb0 [ 492.975484] ? copy_mount_string+0x40/0x40 [ 492.979696] ? rcu_pm_notify+0xc0/0xc0 [ 492.983568] ? copy_mount_options+0x5f/0x2e0 [ 492.987954] ? rcu_read_lock_sched_held+0x108/0x120 [ 492.992949] ? kmem_cache_alloc_trace+0x459/0x740 [ 492.997775] ? kasan_check_write+0x14/0x20 [ 493.002004] ? copy_mount_options+0x1f7/0x2e0 [ 493.006487] SyS_mount+0xab/0x120 [ 493.009916] ? copy_mnt_ns+0xb30/0xb30 [ 493.013785] do_syscall_64+0x281/0x940 [ 493.017651] ? vmalloc_sync_all+0x30/0x30 [ 493.021783] ? _raw_spin_unlock_irq+0x27/0x70 [ 493.026256] ? finish_task_switch+0x1c1/0x7e0 [ 493.030734] ? syscall_return_slowpath+0x550/0x550 [ 493.035643] ? syscall_return_slowpath+0x2ac/0x550 [ 493.040552] ? prepare_exit_to_usermode+0x350/0x350 [ 493.045546] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 493.050891] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 493.055718] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 493.060884] RIP: 0033:0x454e79 [ 493.064051] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 493.071738] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 493.078991] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 493.086243] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 2018/03/31 08:51:22 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000c80)={&(0x7f0000000c40)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:22 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x10, 0x7, 0xa0, 0x3f, 0x9, 0xffffffffffffffff, 0x5}, 0x2c) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mkdir(&(0x7f0000000780)='./file1\x00', 0x8) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:22 executing program 7 (fault-call:5 fault-nth:32): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 493.093490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 493.100736] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 493.112270] tmpfs: No value for mount option 'rpc_pipefs' [ 493.120743] autofs4:pid:15015:autofs4_fill_super: called with bogus options 2018/03/31 08:51:23 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:23 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 493.544917] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 493.569579] tmpfs: No value for mount option 'rpc_pipefs' [ 493.576588] autofs4:pid:15056:autofs4_fill_super: called with bogus options [ 493.611373] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 493.624279] FAULT_INJECTION: forcing a failure. [ 493.624279] name failslab, interval 1, probability 0, space 0, times 0 [ 493.635555] CPU: 0 PID: 15062 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 493.642825] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 493.652170] Call Trace: [ 493.654776] dump_stack+0x194/0x24d [ 493.658406] ? arch_local_irq_restore+0x53/0x53 [ 493.663069] ? __save_stack_trace+0x7e/0xd0 [ 493.667394] should_fail+0x8c0/0xa40 [ 493.671108] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 493.676388] ? kasan_kmalloc+0xad/0xe0 [ 493.680275] ? kmem_cache_alloc_trace+0x136/0x740 [ 493.685115] ? __memcg_init_list_lru_node+0x169/0x270 [ 493.690302] ? __list_lru_init+0x544/0x750 [ 493.694532] ? sget_userns+0x6b1/0xe40 [ 493.698419] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 493.703164] ? do_mount+0xea4/0x2bb0 [ 493.706858] ? SyS_mount+0xab/0x120 [ 493.710463] ? do_syscall_64+0x281/0x940 [ 493.714504] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 493.719872] ? find_held_lock+0x35/0x1d0 [ 493.724025] ? __lock_is_held+0xb6/0x140 [ 493.728085] ? check_same_owner+0x320/0x320 [ 493.732391] ? rcu_note_context_switch+0x710/0x710 [ 493.737305] should_failslab+0xec/0x120 [ 493.741259] kmem_cache_alloc_trace+0x4b/0x740 [ 493.745821] ? __kmalloc_node+0x33/0x70 [ 493.749775] ? __kmalloc_node+0x33/0x70 [ 493.753728] ? rcu_read_lock_sched_held+0x108/0x120 [ 493.758729] __memcg_init_list_lru_node+0x169/0x270 [ 493.763732] ? list_lru_add+0x7c0/0x7c0 [ 493.767696] ? __kmalloc_node+0x47/0x70 [ 493.771656] __list_lru_init+0x544/0x750 [ 493.775700] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 493.781565] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 493.786566] ? lockdep_init_map+0x9/0x10 [ 493.790619] sget_userns+0x6b1/0xe40 [ 493.794311] ? set_anon_super+0x20/0x20 [ 493.798266] ? put_filp+0x90/0x90 [ 493.801701] ? destroy_unused_super.part.6+0xd0/0xd0 [ 493.806788] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 493.811785] ? trace_hardirqs_off+0x10/0x10 [ 493.816086] ? putname+0xee/0x130 [ 493.819522] ? cap_capable+0x1b5/0x230 [ 493.823391] ? security_capable+0x8e/0xc0 [ 493.827523] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 493.832691] ? ns_capable_common+0xcf/0x160 [ 493.836994] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 493.842165] mount_ns+0x6d/0x190 [ 493.845513] rpc_mount+0x9e/0xd0 [ 493.848860] mount_fs+0x66/0x2d0 [ 493.852209] vfs_kern_mount.part.26+0xc6/0x4a0 [ 493.856770] ? may_umount+0xa0/0xa0 [ 493.860379] ? _raw_read_unlock+0x22/0x30 [ 493.864505] ? __get_fs_type+0x8a/0xc0 [ 493.868375] do_mount+0xea4/0x2bb0 [ 493.871901] ? copy_mount_string+0x40/0x40 [ 493.876114] ? rcu_pm_notify+0xc0/0xc0 [ 493.879986] ? copy_mount_options+0x5f/0x2e0 [ 493.884375] ? rcu_read_lock_sched_held+0x108/0x120 [ 493.889369] ? kmem_cache_alloc_trace+0x459/0x740 [ 493.894194] ? kasan_check_write+0x14/0x20 [ 493.898406] ? _copy_from_user+0x99/0x110 [ 493.902546] ? copy_mount_options+0x1f7/0x2e0 [ 493.907034] SyS_mount+0xab/0x120 [ 493.910465] ? copy_mnt_ns+0xb30/0xb30 [ 493.914334] do_syscall_64+0x281/0x940 [ 493.918199] ? vmalloc_sync_all+0x30/0x30 [ 493.922327] ? _raw_spin_unlock_irq+0x27/0x70 [ 493.926801] ? finish_task_switch+0x1c1/0x7e0 [ 493.931275] ? syscall_return_slowpath+0x550/0x550 [ 493.936186] ? syscall_return_slowpath+0x2ac/0x550 [ 493.941098] ? prepare_exit_to_usermode+0x350/0x350 [ 493.946092] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 493.951436] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 493.956261] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 493.961426] RIP: 0033:0x454e79 [ 493.964593] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 493.972280] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 493.979528] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 493.987209] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 493.994458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 494.001706] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 494.014331] tmpfs: No value for mount option 'rpc_pipefs' [ 494.021132] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 494.026560] autofs4:pid:15062:autofs4_fill_super: called with bogus options [ 494.035145] tmpfs: No value for mount option 'rpc_pipefs' [ 494.047115] autofs4:pid:15071:autofs4_fill_super: called with bogus options 2018/03/31 08:51:24 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:24 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:24 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) 2018/03/31 08:51:24 executing program 6: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) sendmsg$kcm(r1, &(0x7f0000000280)={&(0x7f0000000740)=@generic={0x11, "71499ed006913c79565ee6476b077246897aa9ec334458c9216232701021575aabb145540c2c1d9ca6d21c5d015c64d01f1d6dcbac953c58019306d7d5ab7cea1a7b6960bfee37f468de0f28dc7ca41a42642e93d5151e68971c33c3aae5c00d187136cd2c2dc2c46bdfb6970c941acf66d626b7380512118381361efa38"}, 0x80, &(0x7f0000000c40)=[{&(0x7f00000007c0)="fedb318d99a35b39e7ca9d27d81bc5ba003ab7987de0bba4fbf47a6926d99690446bbaa5b5038aabcb5554a2b24cf62d6c7f10621bfc3b9d1b81f6d3daa436941aa0ec90ca8593111124ab11e1376cdd50579bb64bcfaed1ecc1a7da3c51f2182d231f316b737fca89a9c738df28556bc7f8d45dd3b8ffb33c695754dc58ff09", 0x80}, {&(0x7f0000000840)="49ea5588a554ed1e254aa5a6da4865e408bd3e4eec38aca75a13258fee75151887a69ea93ae14dbb869ff48bc9eab8eded053f142d19df2a26973aefc14aee1dfd11f2f0ee469ec2497ed7e561d60299be98c59f50c6aebbe68f0ba2252a08a810ed156085c97ceca0d9f44e96380ad2d04c30b39adaa8366fa85ef1d54a4eb188ecc4f29110fe7ee78fab72f34f1887f8e61252cf0dc9b226b2e673246b77e1247957785c3ddf9bacc95bd2", 0xac}, {&(0x7f0000000900)="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", 0xff}, {&(0x7f0000000a00)="0bb63a97bf107970a245928a69eaa835370e41389c8538f2b90ab33bb6ef25862f5e4d6d649299348a6a52ca9af292eaf6b93763c79fe3fbf74c186282e3d97cdbd9ea5a9390039b146a8e995e02e1f90e90448c76490e51b2443060402f98c2f248d9125003996d8cbd7571ed973ba619dc52f605194a1e4dfa0d46ebac0081cfb2018d18bb541016bde6f80a5706602f03daad56223d7183a6", 0x9a}, {&(0x7f0000000ac0)="1ff4368cb9c7cf51e05f4a5f710777e84ed79c20b4a279a011f1ddfb06d21577ae6cbb8f7d91de9dc277a25607094b7cf0c841b85a9b79fe80c1cfa3828bf24efa39b2366b651e1198e639961d9d72bccd79ff10b52b500e176392e760532b786e6c900877110c866ece696803819a457b2bbe31abf9cc9a1d898c66117c3ae021a1f47a06843ef4d2772d6e626168a410013ed70f1b2240ff7490181c1a16c5beea0a19e2ddcc8933d569", 0xab}, {&(0x7f0000000140)="a9328b86ee5abba1553162b6d06f9f48ddc561d05e6cc40d84685ee5b36c0c70d22c", 0x22}, {&(0x7f0000000b80)="a1a7be0a4d9be92b4f6f0988ee52e705fc5c6743d948b8f237736e5e93b736202ed041ee4a89ed96be555679d685589598abf1efb8ef78f05280dff096f0d4d862d51d4acfdd34cfcdf534fa3fbe7a095404e8a9261480d90b93c5271551e527d8a0b7453bfbc80610e68400ae218a552cd813279472d1b2487c3c9606567bbd8e1f1c310345c9208e01ed31acec404342e4b634cd97edfef4441957302650ce19e163a8c7e74b7c1d7b5f8ef182", 0xae}], 0x7, &(0x7f0000000cc0)=[{0x90, 0x10c, 0x3, "63d4ad8ada6a1e535903ee0c4e3e6e33a62e6e97b503b958352d444034248b656daf26ac532da38360c9fbd343e0f25b25c40033410f886672dcecf0722f4112e5da682e4b7893a3d24ebc05e41da52516230ee3a9d328d61d58bbff7bc583f974dbb8edd997e652217b3d1057d6326bbb77f53a1af9aaac1b"}, {0xf8, 0x0, 0xbc, "5a7792ba81334466c2fea3322421f630047124c86524e12d38693a82f16fb1ac1145fa1ec4fb1c1a9a2329e0bf345c3c91285a706947c913845b21fd42e6a62ce15b8d07160141c8f3efbaffe369b2766ff41bd9e4005525286bed73f4a9953a17e0639959ad6da8dfdcef4beb6da7d4bd89a95ff48664a9c31f738368da6d73b5b2d3594f86febf6ceca809055622a7c48ca089b8771487f387d58bd019ea3b11b4146e83863c5ba4c60becb999279419e3361a956d5069a1ac49f6dcc00a7b5e0041335f3e760a7aff96528e1fba8ad040f39a2811438e7c118c07877fc71ee4e7aa37"}, {0x28, 0x84, 0x5, "8aa077d7e4b1c82fed0470e5c16d5415ed037c"}, {0x50, 0x117, 0x7, "a24786694042c63b9f3eea922a192e0a130450dba4d2ab302f15000d0d7ca773c3714456b6a86eac3ef80cb40f510e928874776b7c6b626a49"}], 0x200, 0x80}, 0x240000c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400)=r8, 0x19) 2018/03/31 08:51:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000d40)={0xffffffffffffffff}) sendmsg(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000002280)="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", 0x1000}, {&(0x7f0000000d80)="59049b71283d8ac2916d2b810f2b06c862bad554e74d741f43b2374619850efc052bdd317e24a6cd008ba092a65a2b7d45825b55f86c38b75d3a29e6c8271995f451daf806dd33e6f423a80f54b263d4", 0x50}, {&(0x7f0000000e00)="94778f274d518c8448b8ddbd98e6bacbbb144cc153301d0392a36420ab0d74bc0c7013e32d9933194d659c450fa2e2fc3a428f67a9322dadb13bb91c54605bde6085f2daeaa78a1558bef9b6f2350b4fd68f885c71f7f997f8e540adb0f61b672fb395e697ee6c3e860561c8d777eed3f877e55443f41a6681a34187a95ba3cfb8e1c043cc6a578aa37564901cba54143401bcb5bff80da1885e862c8aa1fa06c5f0bb641a986aed9c63ffbf489084c7cd12b11820ad59455ee0995ea54ef40c65a857cf447d072122fefdc443df1bc3a95cc74296a1c2cb8f72fb905fe7ab5177fb3da06dbe77e75870d384489f", 0xee}, {&(0x7f0000000f00)="4fcafe1e9fbdde91c12b46e2442af7edf32d316a70ea840cd3af25a9d47094ebe9", 0x21}, {&(0x7f0000000f40)="7e3dfd8fdeafd991f2c08934c0de9f04e917ef40f49855d8d5ea1f3abf61fc57c32884c0fe0513777cbca8869599b163ff83738986b317e94c01705a60bd6d8b95d5f6c4df57535aeae4dbe820ffde247abfabfacac1e2f268b9adc0b860a0d71d", 0x61}, {&(0x7f0000003280)="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", 0x1000}], 0x6, &(0x7f0000001040)=[{0x48, 0x10d, 0x1f, "bda78ad1f55d0980af70b57a7a99ee84ebc77cef147c5db0be9f8237f3fbc837115c8f4ce2a57d5b5197a14986b95a3b44125275"}, {0x10, 0x119, 0x9}], 0x58, 0x40}, 0x0) r2 = perf_event_open(&(0x7f0000000c80)={0x0, 0x70, 0x7, 0x4, 0x1ff, 0x3ff, 0x0, 0xdb40000000000000, 0x40000, 0xa, 0x5, 0x3, 0x4, 0x100000001, 0x80000001, 0x0, 0x4, 0x6, 0xfff, 0xc8, 0x0, 0x0, 0x80, 0x9884, 0x3f, 0x0, 0xade, 0x800, 0x3, 0x9, 0x1, 0x3ff, 0x2, 0x678, 0xd6e, 0xce, 0x3, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000c40), 0x5}, 0x1000, 0xfffffffffffffefb, 0xfffffffffffff801, 0x7, 0x5c, 0x80000001, 0x68}, 0x0, 0x8, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000d00)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r3, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:24 executing program 0: r0 = gettid() r1 = socket$kcm(0x29, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r2, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r5}, 0x10) recvmsg$kcm(r1, &(0x7f0000001a00)={&(0x7f0000000780)=@alg, 0x80, &(0x7f0000001980)=[{&(0x7f0000000800)=""/78, 0xfffffffffffffcd0}, {&(0x7f0000000880)=""/84, 0x54}, {&(0x7f0000000900)=""/23, 0x17}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/33, 0x21}], 0x5, 0x0, 0x0, 0x6}, 0x2001) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r6, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000680)=r6, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x7, 0x7, 0x10001, 0x7f, 0x4, r2, 0x9}, 0x2c) mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r2, 0x28}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001a40)={0x0, 0x52b3a798, 0x0, 0xfffffffffffffffe, 0xa, r7, 0x6}, 0x2c) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:24 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:24 executing program 7 (fault-call:5 fault-nth:33): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") [ 494.411274] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 494.433874] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 494.441667] tmpfs: No value for mount option 'rpc_pipefs' [ 494.451344] autofs4:pid:15098:autofs4_fill_super: called with bogus options [ 494.457984] FAULT_INJECTION: forcing a failure. [ 494.457984] name failslab, interval 1, probability 0, space 0, times 0 [ 494.469770] CPU: 0 PID: 15099 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 494.477033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 494.486374] Call Trace: [ 494.488949] dump_stack+0x194/0x24d [ 494.492553] ? arch_local_irq_restore+0x53/0x53 [ 494.497205] ? __save_stack_trace+0x7e/0xd0 [ 494.501517] should_fail+0x8c0/0xa40 [ 494.505215] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 494.510295] ? kasan_kmalloc+0xad/0xe0 [ 494.514167] ? kmem_cache_alloc_trace+0x136/0x740 [ 494.518987] ? __memcg_init_list_lru_node+0x169/0x270 [ 494.524152] ? __list_lru_init+0x544/0x750 [ 494.528360] ? sget_userns+0x6b1/0xe40 [ 494.532225] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 494.536952] ? do_mount+0xea4/0x2bb0 [ 494.540646] ? SyS_mount+0xab/0x120 [ 494.544255] ? do_syscall_64+0x281/0x940 [ 494.548301] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 494.553653] ? find_held_lock+0x35/0x1d0 [ 494.557691] ? __lock_is_held+0xb6/0x140 [ 494.561734] ? check_same_owner+0x320/0x320 [ 494.566046] ? rcu_note_context_switch+0x710/0x710 [ 494.570955] should_failslab+0xec/0x120 [ 494.574909] kmem_cache_alloc_trace+0x4b/0x740 [ 494.579471] ? __kmalloc_node+0x33/0x70 [ 494.583422] ? __kmalloc_node+0x33/0x70 [ 494.587372] ? rcu_read_lock_sched_held+0x108/0x120 [ 494.592363] __memcg_init_list_lru_node+0x169/0x270 [ 494.597356] ? list_lru_add+0x7c0/0x7c0 [ 494.601305] ? __kmalloc_node+0x47/0x70 [ 494.605265] __list_lru_init+0x544/0x750 [ 494.609311] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 494.615180] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 494.620179] ? lockdep_init_map+0x9/0x10 [ 494.624215] sget_userns+0x6b1/0xe40 [ 494.627903] ? set_anon_super+0x20/0x20 [ 494.631881] ? put_filp+0x90/0x90 [ 494.635325] ? destroy_unused_super.part.6+0xd0/0xd0 [ 494.640420] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 494.645420] ? trace_hardirqs_off+0x10/0x10 [ 494.649737] ? putname+0xee/0x130 [ 494.653166] ? cap_capable+0x1b5/0x230 [ 494.657038] ? security_capable+0x8e/0xc0 [ 494.661170] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 494.666337] ? ns_capable_common+0xcf/0x160 [ 494.670634] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 494.675806] mount_ns+0x6d/0x190 [ 494.679156] rpc_mount+0x9e/0xd0 [ 494.682511] mount_fs+0x66/0x2d0 [ 494.685856] vfs_kern_mount.part.26+0xc6/0x4a0 [ 494.690410] ? may_umount+0xa0/0xa0 [ 494.694021] ? _raw_read_unlock+0x22/0x30 [ 494.698148] ? __get_fs_type+0x8a/0xc0 [ 494.702017] do_mount+0xea4/0x2bb0 [ 494.705545] ? copy_mount_string+0x40/0x40 [ 494.709757] ? rcu_pm_notify+0xc0/0xc0 [ 494.713632] ? copy_mount_options+0x5f/0x2e0 [ 494.718031] ? rcu_read_lock_sched_held+0x108/0x120 [ 494.723040] ? kmem_cache_alloc_trace+0x459/0x740 [ 494.727873] ? kasan_check_write+0x14/0x20 [ 494.732096] ? _copy_from_user+0x99/0x110 [ 494.736228] ? copy_mount_options+0x1f7/0x2e0 [ 494.740718] SyS_mount+0xab/0x120 [ 494.744149] ? copy_mnt_ns+0xb30/0xb30 [ 494.748015] do_syscall_64+0x281/0x940 [ 494.751883] ? vmalloc_sync_all+0x30/0x30 [ 494.756006] ? _raw_spin_unlock_irq+0x27/0x70 [ 494.760493] ? finish_task_switch+0x1c1/0x7e0 [ 494.764971] ? syscall_return_slowpath+0x550/0x550 [ 494.769875] ? syscall_return_slowpath+0x2ac/0x550 [ 494.774789] ? prepare_exit_to_usermode+0x350/0x350 [ 494.779789] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 494.785138] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 494.789967] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 494.795133] RIP: 0033:0x454e79 [ 494.798297] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 494.805987] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 494.813238] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 494.820492] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 494.827736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 494.834979] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 494.846597] tmpfs: No value for mount option 'rpc_pipefs' [ 494.854118] autofs4:pid:15099:autofs4_fill_super: called with bogus options 2018/03/31 08:51:24 executing program 7 (fault-call:5 fault-nth:34): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b4f38b69f9bea45787f6f9fd0e2e7") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") 2018/03/31 08:51:24 executing program 5: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x0, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 494.882372] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" 2018/03/31 08:51:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002240)={0xffffffff, 0xfffffffffffffff9, 0x8}, 0xa) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001e40)={&(0x7f0000000040)='./file0/bus\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000001e80)='./file1\x00', &(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)='autofs\x00', 0x10400, &(0x7f0000001f40)="63a67f0975f7df618c76e9e1063a37697a2812ba8501e566036b80c7316d4175948a6ca9c95ff82364ce8f02103fecd289fda97b25c12a3c15422e7a41e82883af14e24f2f5ea4fa1f8025f44146fdabf039b7eb6450947e730316d6a5a157a7e350eefd0b") bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001480)={r0, 0x28, &(0x7f0000001440)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000014c0)={r1, 0x3, 0x8}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000013c0)="2770c34f2aaec7dad781bf206bebf8191e7ca3eb75eababb4720a018bcbb8ee2225dd58c3d14f8e280e2e4a3963e01b8fdd1", 0x32}], 0x1, &(0x7f0000002a00)=ANY=[], 0x0, 0x20000000}, 0x4000004) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000c80)='./file1\x00', &(0x7f0000000cc0)='ext4\x00', 0x2140002, &(0x7f0000000d00)="ec30734b78f61e") mkdir(&(0x7f0000001500)='./file1\x00', 0x80) mkdir(&(0x7f0000002200)='./file0/bus\x00', 0x76) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/bus\x00', &(0x7f0000000b40)='ncpfs\x00', 0x20, &(0x7f0000000b80)="9e7f368787c3d6d8bc0cef4ea8d0489cd8d924b036fc775da4abbb8d680d5f83743a919c986a107963cac6ce48c79592c983f9a71d802ee4ba94d1f68b0befa51a3dce951bd6a53c0979541925789fa46164c30b6c46d6977b064c0ca12e136bb3b6fdb5c05fe3e6159f9439bfe17c21988ef2fcd38fc731e45b4fb9bf59767186efc1505db248ea93e07729df3e") mount(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)='./file0\x00', &(0x7f0000000dc0)='devtmpfs\x00', 0x10, 0x0) [ 494.931446] tmpfs: No value for mount option 'rpc_pipefs' [ 494.940202] autofs4:pid:15098:autofs4_fill_super: called with bogus options 2018/03/31 08:51:24 executing program 0: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x0, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) socketpair$ax25(0x3, 0x5, 0x7, &(0x7f0000000740)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400), 0x19) 2018/03/31 08:51:24 executing program 3: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0x0, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00', r4}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0x0, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) 2018/03/31 08:51:24 executing program 6: r0 = gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x2, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f0000000280)='./file0/file0/file0\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000140)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, r5, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680)=r5, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000740)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9080009269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a402c09d0f325b9bc0bd6aa2b1392f5b75b778888244a8cfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa91860f0d00f0f6150bf9d8eef008c452884b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2000000000000000000000000000000000000000000", &(0x7f00000006c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000000400)=r7, 0x19) mkdir(&(0x7f00000008c0)='./file0\x00', 0x8) 2018/03/31 08:51:24 executing program 4: r0 = gettid() socket$kcm(0x29, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r1, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000440)=0x5bc6) mkdir(&(0x7f0000000280)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x0, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, r0, 0xb, 0xffffffffffffffff, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r4}, 0x10) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000680), 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000300)="1cb335da96a398ff09a3375ead96f3feb43168952b122288b9b20409269a5c47ed1377a08bf87e3a12125d0c9cab0738f1fa8253bbcc9acf15a8f5083f3d86f45f1e5dd2ebea03a4bbc09d0f325b9bc0bd6aa2b1392f5b75b778888244accfa6ec6d65ddd13e04c0a10e02cebe33eb1802f595241af2a188ead84e29e838cdfe67e6fc6bdfa30200fc4c0fa9185080864458e95274f419d65e4060f0d00f0f6150bf9d8eef008c452884e2806b2e8e9627b76af244b5ceb445a27b62918a188390b7611abfed87b199157462e40687806d329ad20a8f1a76cd2ec2a01cfccb268f9c03000cc699d00000000000000000", &(0x7f00000001c0)=""/9}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000400)=r5, 0x19) 2018/03/31 08:51:25 executing program 2: gettid() socket$kcm(0x29, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000000a, 0x1ff, 0x7fff, 0x100000043}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0xa, 0x5, 0xffffffffffff36f1, 0x1ff, 0x18, r0, 0x9}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x7, 0x70, 0x9, 0x7, 0x7ff, 0xffffffff, 0x0, 0x1, 0x20001, 0x5, 0x1, 0x9, 0x8, 0xfffffffffffffff7, 0x4, 0x67b, 0x8001, 0x7fffffff, 0x7, 0xbe, 0xb8, 0x5, 0xd9, 0x5, 0x128, 0x6, 0x4, 0xfffffffffffffeff, 0x1, 0x3, 0xffffffff, 0x1, 0xfffffffffffffffb, 0x0, 0x400, 0x1, 0x7fffffff, 0x0, 0x0, 0x5a, 0x4, @perf_config_ext={0x2, 0x2}, 0x20, 0x99b, 0x0, 0x7, 0x1, 0x1, 0xffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000440)=0x5bc6) socketpair(0x8, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000025c000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000003c0)={&(0x7f0000000080)='./file1\x00'}, 0x10) mkdir(&(0x7f00000006c0)='./file1\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp, 0x8000000200000000, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x7, 0xf2, 0x0, 0x2, 0x0, 0xc7c5, 0x800, 0xc, 0x8, 0x7, 0x48, 0x8, 0x7fffffff, 0x3, 0xad, 0x1, 0x800, 0x1, 0xfffffffffffff286, 0x5, 0x100000001, 0x28c4, 0x200, 0x81, 0xfff, 0x4, 0xffffffff, 0x100, 0x100, 0x2, 0xfffffffffffeffff, 0x100000000, 0x9, 0x9, 0x401, 0x100000000, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000005c0), 0x1}, 0x200, 0x4, 0x10000, 0x5, 0x3, 0x7f}, 0x0, 0xb, r4, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000680)=r4, 0x4) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000580)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)='squashfs\x00', 0x808, &(0x7f00000002c0)="ac9558818f62e72b6f91beaceadb3a985059e3daba0fff7ae9829a87f616e2adebede33891df5f847f840b1d4601d44abb3d8ed8e1a5a741efd6bec2997e6789fb79eb8d89122d9abb2de430a722093924adc54397469b0f3dc53737fed53ba196085ec845c3e43ec52eec494437593e784a6aa83927d2bc251f7b515a10779a7af4c2f092dba12cbd849c5429cd154c171f0cf888bda02abae80bb8817734409e219dac443300b80b358fbf6d4a7ed3577aef284cf07f4bfdc0e87157fc902a003d3eef3d0730a347") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28}, 0x10) socketpair(0x5, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000400)=r6, 0x19) [ 495.279821] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 495.299259] FAULT_INJECTION: forcing a failure. [ 495.299259] name failslab, interval 1, probability 0, space 0, times 0 [ 495.310774] CPU: 0 PID: 15144 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 495.318046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.327384] Call Trace: [ 495.329959] dump_stack+0x194/0x24d [ 495.333566] ? arch_local_irq_restore+0x53/0x53 [ 495.338231] ? find_held_lock+0x35/0x1d0 [ 495.342277] should_fail+0x8c0/0xa40 [ 495.345969] ? __list_lru_init+0x352/0x750 [ 495.350190] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 495.355278] ? trace_hardirqs_off+0x10/0x10 [ 495.359575] ? find_next_zero_bit+0xe3/0x110 [ 495.363960] ? trace_hardirqs_off+0x10/0x10 [ 495.368256] ? find_held_lock+0x35/0x1d0 [ 495.372296] ? __lock_is_held+0xb6/0x140 [ 495.376347] ? check_same_owner+0x320/0x320 [ 495.380645] ? lock_downgrade+0x980/0x980 [ 495.384865] ? rcu_note_context_switch+0x710/0x710 [ 495.389770] ? find_held_lock+0x35/0x1d0 [ 495.393819] should_failslab+0xec/0x120 [ 495.397787] __kmalloc+0x63/0x760 [ 495.401214] ? lock_downgrade+0x980/0x980 [ 495.405341] ? register_shrinker+0x10e/0x2d0 [ 495.409730] ? trace_event_raw_event_module_request+0x320/0x320 [ 495.415764] register_shrinker+0x10e/0x2d0 [ 495.419975] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 495.425755] ? memcpy+0x45/0x50 [ 495.429017] sget_userns+0xbbf/0xe40 [ 495.432711] ? set_anon_super+0x20/0x20 [ 495.436661] ? put_filp+0x90/0x90 [ 495.440094] ? destroy_unused_super.part.6+0xd0/0xd0 [ 495.445177] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 495.450170] ? trace_hardirqs_off+0x10/0x10 [ 495.454474] ? putname+0xee/0x130 [ 495.457905] ? cap_capable+0x1b5/0x230 [ 495.461768] ? security_capable+0x8e/0xc0 [ 495.465899] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 495.471063] ? ns_capable_common+0xcf/0x160 [ 495.475362] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 495.480525] mount_ns+0x6d/0x190 [ 495.483870] rpc_mount+0x9e/0xd0 [ 495.487209] mount_fs+0x66/0x2d0 [ 495.490552] vfs_kern_mount.part.26+0xc6/0x4a0 [ 495.495107] ? may_umount+0xa0/0xa0 [ 495.498710] ? _raw_read_unlock+0x22/0x30 [ 495.502845] ? __get_fs_type+0x8a/0xc0 [ 495.506707] do_mount+0xea4/0x2bb0 [ 495.510222] ? copy_mount_string+0x40/0x40 [ 495.514430] ? rcu_pm_notify+0xc0/0xc0 [ 495.518295] ? copy_mount_options+0x5f/0x2e0 [ 495.522675] ? rcu_read_lock_sched_held+0x108/0x120 [ 495.527686] ? kmem_cache_alloc_trace+0x459/0x740 [ 495.532504] ? copy_mount_options+0x1f7/0x2e0 [ 495.536973] SyS_mount+0xab/0x120 [ 495.540400] ? copy_mnt_ns+0xb30/0xb30 [ 495.544265] do_syscall_64+0x281/0x940 [ 495.548128] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 495.553638] ? syscall_return_slowpath+0x550/0x550 [ 495.558541] ? syscall_return_slowpath+0x2ac/0x550 [ 495.563459] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 495.568800] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.573630] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 495.578791] RIP: 0033:0x454e79 [ 495.581954] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 495.589636] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 495.596880] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 495.604131] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 495.611379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 495.618622] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 [ 495.656230] tmpfs: No value for mount option 'rpc_pipefs' [ 495.663668] autofs4:pid:15144:autofs4_fill_super: called with bogus options [ 495.671661] ------------[ cut here ]------------ [ 495.676471] refcount_t: increment on 0; use-after-free. [ 495.681971] WARNING: CPU: 0 PID: 15144 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 495.689753] Kernel panic - not syncing: panic_on_warn set ... [ 495.689753] [ 495.697100] CPU: 0 PID: 15144 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #43 [ 495.704350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 495.713682] Call Trace: [ 495.716264] dump_stack+0x194/0x24d [ 495.719872] ? arch_local_irq_restore+0x53/0x53 [ 495.724532] ? vsnprintf+0x1ed/0x1900 [ 495.728378] panic+0x1e4/0x41c [ 495.731550] ? refcount_error_report+0x214/0x214 [ 495.736299] ? show_regs_print_info+0x18/0x18 [ 495.740779] ? __warn+0x1c1/0x200 [ 495.744227] ? refcount_inc+0x47/0x50 [ 495.748007] __warn+0x1dc/0x200 [ 495.751269] ? refcount_inc+0x47/0x50 [ 495.755045] report_bug+0x1f4/0x2b0 [ 495.758652] fixup_bug.part.10+0x37/0x80 [ 495.762693] do_error_trap+0x2d7/0x3e0 [ 495.766556] ? vprintk_default+0x28/0x30 [ 495.770602] ? math_error+0x400/0x400 [ 495.774383] ? printk+0xaa/0xca [ 495.777636] ? show_regs_print_info+0x18/0x18 [ 495.782109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.786927] do_invalid_op+0x1b/0x20 [ 495.790615] invalid_op+0x1b/0x40 [ 495.794044] RIP: 0010:refcount_inc+0x47/0x50 [ 495.798424] RSP: 0018:ffff8801c5fe7810 EFLAGS: 00010286 [ 495.803760] RAX: dffffc0000000008 RBX: ffff8801a5582084 RCX: ffffffff815b423e [ 495.811009] RDX: 0000000000004074 RSI: ffffc900036ac000 RDI: 1ffff10038bfce87 [ 495.818261] RBP: ffff8801c5fe7818 R08: 0000000000000000 R09: 0000000000000000 [ 495.825508] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801c5fe7aa8 [ 495.832764] R13: ffff8801d3327513 R14: ffff8801a5582080 R15: ffff8801d3327501 [ 495.840038] ? vprintk_func+0x5e/0xc0 [ 495.843822] sk_alloc+0x3f9/0x1440 [ 495.847346] ? sock_def_error_report+0x5e0/0x5e0 [ 495.852076] ? __raw_spin_lock_init+0x2d/0x100 [ 495.856641] ? trace_hardirqs_off+0x10/0x10 [ 495.860945] ? do_raw_write_unlock+0x290/0x290 [ 495.865507] ? trace_hardirqs_off+0x10/0x10 [ 495.869804] ? __raw_spin_lock_init+0x1c/0x100 [ 495.874367] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 495.879357] ? find_held_lock+0x35/0x1d0 [ 495.883421] ? inet_create+0x3fc/0xf50 [ 495.887282] ? lock_downgrade+0x980/0x980 [ 495.891404] ? lock_release+0xa40/0xa40 [ 495.895350] ? lock_downgrade+0x980/0x980 [ 495.899474] inet_create+0x47c/0xf50 [ 495.903162] ? ipip_gro_receive+0xf0/0xf0 [ 495.907290] ? __lock_is_held+0xb6/0x140 [ 495.911350] __sock_create+0x4d4/0x850 [ 495.915221] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 495.920132] ? __might_sleep+0x95/0x190 [ 495.924088] SyS_socketpair+0x1c0/0x6f0 [ 495.928044] ? SyS_socket+0x1d0/0x1d0 [ 495.931823] ? do_syscall_64+0xb7/0x940 [ 495.935771] ? SyS_socket+0x1d0/0x1d0 [ 495.939546] do_syscall_64+0x281/0x940 [ 495.943407] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 495.948919] ? syscall_return_slowpath+0x550/0x550 [ 495.953820] ? syscall_return_slowpath+0x2ac/0x550 [ 495.958728] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 495.964068] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 495.968898] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 495.974075] RIP: 0033:0x454e79 [ 495.977247] RSP: 002b:00007fd712f3bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 495.984931] RAX: ffffffffffffffda RBX: 00007fd712f3c6d4 RCX: 0000000000454e79 [ 495.992172] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 495.999423] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 496.006671] R10: 0000000020001e00 R11: 0000000000000246 R12: 00000000ffffffff [ 496.013912] R13: 0000000000000640 R14: 00000000006fb6a0 R15: 0000000000000000 [ 496.021800] Dumping ftrace buffer: [ 496.025446] (ftrace buffer empty) [ 496.029128] Kernel Offset: disabled [ 496.032730] Rebooting in 86400 seconds..