9beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:28 executing program 7 (fault-call:15 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:28 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x0, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:28 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x0, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000d00)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0/file0\x00', &(0x7f00000009c0)='ocfs2_dlmfs\x00', 0x4000, &(0x7f0000000c00)="4a374618f07d9db3522620385b85ee1a719b500b9e6ab11295f1f9bf2bab81ec897c6d40aa27a75e1f81caf6a0783f17d014e558e15a8d568f8edb51dc9d815fb109264cbe70276feac1dd614389d57c7cb053a3f40c70db1e4723d2910a3f871396cc4b4ab5cc4b9bc9f6786fdd738b23fb364cb3121a1f53532a8d66d88a005f56a03d08bd93fb4dd1d1efba2d82e3dfddfadce354a849ac0355c2d627988aca39bdcbbff036058f124dbfafb30ddc485b39db971bf34075") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000500)='gfs2meta\x00', 0x2000, &(0x7f0000000540)="e206883efba083048d544fa36e6705fd88b1c6c37d594a24fcc19cebbda8cb6efa7389d4350018826a20cd234e8caf890f4f259381aef698c6e3babed93a0c0320b41cd88e22a84a9823f091e7f4497ef8f5139f593226d041de4477e349291bc0fc8375036843958804b34c3695fe62885eb22550720d8759258e58e6e4ad857bd01a9d38c6bad122f67d521811fb9fa585b3d0123de9331c7c") mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) close(0xffffffffffffffff) [ 879.668147] FAULT_INJECTION: forcing a failure. [ 879.668147] name failslab, interval 1, probability 0, space 0, times 0 [ 879.679450] CPU: 1 PID: 26275 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 879.686720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.696070] Call Trace: [ 879.698658] dump_stack+0x194/0x24d [ 879.702293] ? arch_local_irq_restore+0x53/0x53 [ 879.706975] should_fail+0x8c0/0xa40 [ 879.710694] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 879.715801] ? lock_downgrade+0x980/0x980 [ 879.719956] ? get_pid_task+0xbc/0x140 [ 879.723848] ? proc_fail_nth_write+0x9b/0x1d0 [ 879.728342] ? map_files_get_link+0x3a0/0x3a0 [ 879.732845] ? find_held_lock+0x35/0x1d0 [ 879.736917] ? check_same_owner+0x320/0x320 [ 879.741234] ? __lock_is_held+0xb6/0x140 [ 879.745297] ? rcu_note_context_switch+0x710/0x710 [ 879.750399] should_failslab+0xec/0x120 [ 879.754702] __kmalloc_track_caller+0x5f/0x760 [ 879.759269] ? strncpy_from_user+0x430/0x430 [ 879.763738] ? strndup_user+0x62/0xb0 [ 879.767528] memdup_user+0x2c/0x90 [ 879.771066] strndup_user+0x62/0xb0 [ 879.774712] SyS_mount+0x3c/0x120 [ 879.778148] ? copy_mnt_ns+0xb30/0xb30 [ 879.782018] do_syscall_64+0x281/0x940 [ 879.785900] ? vmalloc_sync_all+0x30/0x30 [ 879.790040] ? _raw_spin_unlock_irq+0x27/0x70 [ 879.794527] ? finish_task_switch+0x1c1/0x7e0 [ 879.799013] ? syscall_return_slowpath+0x550/0x550 [ 879.803928] ? syscall_return_slowpath+0x2ac/0x550 [ 879.808836] ? prepare_exit_to_usermode+0x350/0x350 [ 879.813834] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 879.819179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 879.824013] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 879.829196] RIP: 0033:0x454e79 [ 879.832371] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 879.840061] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 879.847308] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 879.854563] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 879.861809] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 879.869052] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/30 19:01:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0x101, 0x1fcc3b54, 0x6, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\'\x00') perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair(0x1, 0x0, 0x100000001, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000000c0)='cpuset\\*\x00') socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r1, &(0x7f0000000100)="0fa6a94c4081c2b1ce5b9777ae17afa51f5251c2fcc191decbe5b64d2a7fb8dcfb4df828", &(0x7f0000000680)=""/4096}, 0x18) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000040)) 2018/03/30 19:01:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x10, r0, 0x100000000000, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)={0x1, 0x7c, 0x3, 0x1, 0x2, r1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000002180)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000002d00)=ANY=[@ANYBLOB="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"], 0xffffffea, 0x20004805}, 0x20000800) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) sendmsg(r6, &(0x7f00000020c0)={0x0, 0x0, &(0x7f0000001f40)=[{&(0x7f0000000500)="75570e53a170f116735e6eedacbea0073b6efde52a72317d193645b2fb3954607fe500acc36aceb582f137a23a23bcf98610c538d9c43916229c76c1788517b1dd2a1454ab4b4ca4a489d1a938b200ac3229eb7b6da705c9c33a7c0f6e55369925ccf85aad721cfc1ab3e4abaff501617fd5751d71fadfd69122a6284ea31a5a1a72ddcf6436326dd0c2fbc65f733b93e362f12d17b80b64fa21fc59f066173c36003ca51df358def3252427c1ce56f478d4332c20079abf13e8d2374b6af9ea493a7b240b77bb5fb521d437f62c121683eecf88eb1bcca7f6fa0ed039d1f96e06177efa2602d3c5", 0xe8}, {&(0x7f0000000200)="464bf8dbf11d968d053f45888c", 0xd}, {&(0x7f0000000280)="822c95f1095c93bb71240f7bba04bbc3ca3b1bf766ac22def2a926659c1097", 0x1f}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000700)="b0facb482e3ddb91909750ce2f47d2d62ebcd552a89879ce3c1be12831a52877c5181ac826260c63b72baee228db0c70a4326e3c732649e079aa1d993bb7d60e52d1b7c6f0af0b51", 0x48}, {&(0x7f00000009c0)="7aa661b523d3f32d9ec38aa58442d4d612415072d8b8e290758f80f0ae6650d59d45a465e43b11af1974247a679b559a3b7cd8450e547c7b6b3528e6fa0f718b79cff8a89e8377c1ef12e7988f098f14826a8b9a30b9a136fc38e695bbea4ff9b281eed1148799ba52b95113472711b18f05a92edff0061621a00f9bc43449e10b042b26d0271afc6447aeecfaeec539afe35b673feeedf58c7b990ae760ed885108a1523b0455a24cba773dade969da0c6628333a49cce151cbdb", 0xbb}, {&(0x7f0000001c00)="ad2193b3dabb0c287224b84fee2e7bfee56a5216e983aa1abc506a2342553ea34d9bc1c3bceebca2b902365d268689b3eb3c54de5274ff5564558989425eef0cc03739ccc589c9acdcc861bb0b0a96fd21fe2d40b68b8ad8f742319be10d41a4c6ca8fbc532791006dbdd1d477829ec440096b81be748c63b74fb9eef6da0a518085d0b6e937446e68d231863f6aa108b8610832cca4c2c81b48bf", 0x9b}, {&(0x7f0000001cc0)="29761f8d4bcf91258f82c458282ef107433306682aa2b1ebc4d828d640bf1c3e362aca012b4bd6aaa1f06021b3b38aa89e99dbb05e677ef3ebf49f3674305927101798eb9bf78937cf64615d82920a23a1a21cfa96cbd3f48da7dc2a6c191d29489655e764c3ba9d294851e4bdd6b5f22928640ea33cb8b3136394afbfac62f0fe75caab9f82635a1be0482d0b2c7d3e47f3c19ebd293426ffdeeedf5f47cdd2a28c11c6dd0c7c72c719a1c3d0fa22f165454f9ed04522c46ef3115dd693aaea49e6288eb94efc6ffe5d6007b31883", 0xcf}, {&(0x7f0000001dc0)="870fe0e1acb7edf85009c686d799fb9e8e017c6cb84da99980fd07eabdf6611c24ebca2aa36af1a00d52c1398af776ef75f31a73dbaf9482c895bc48e6823175adb8f3635d10e298683aa7e89ebe72f7f29a573dc7e75650a9133986593441b89ec5209c67c7aeefaf44dd9d1fe8b28f98a94d3bd837779b8978", 0x7a}, {&(0x7f0000001e40)="634240bf9f2028ff1d6215d1001d02937ecaf0b95d8d6bf3484cc2c6a22f76e4bfd36e3d90be6698f3c863cb093857fbdf76c58eed5dadf0ae40e4dae48aaeac24f311dcf9648fe44f66bfc25bcf352297a717492e54ae270e32d6783ae34481ac01441050757ba1e972a4a502636ea421c5fd8b01f270318320ded0976536162682d86648cc93e0d038801a181ab071d65bd8821dd5aba1a568a6a99a090bfce3fe2084517a3ed04a0ac2a9eee4529073ff545028e42203f668f4ba4dea1a23f595010cec97f148b4923a1e5abfd8ede4c89072197483831fb0387398d6f778bd154010bc33a3c2bf865be2b46063f374500f4b0a1e4bf0", 0xf8}], 0xa, &(0x7f0000002000)=[{0x20, 0x112, 0x760d, "556da4dc3964a5c0d69f"}, {0x38, 0x1be, 0x5, "c0c5b70da533119bee796f3500fd09980792eab26e9e6a542c2aec0a8588145f699dbc15"}, {0x18, 0x107, 0x7, "4b042874e5"}, {0x40, 0x112, 0x7, "bb48ba6529ea7afb03c07e5564505e9ed54ada6537d93e5b879cedf6e620445a13ef26f01095acea37334164"}], 0xb0, 0x41}, 0x40) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000880)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000840)={r5}) mkdir(&(0x7f0000002100)='./file0/file0\x00', 0x2) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000002140)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x0, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 7 (fault-call:15 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 880.011737] FAULT_INJECTION: forcing a failure. [ 880.011737] name failslab, interval 1, probability 0, space 0, times 0 [ 880.023131] CPU: 0 PID: 26306 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 880.030400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.039739] Call Trace: [ 880.042323] dump_stack+0x194/0x24d [ 880.046980] ? arch_local_irq_restore+0x53/0x53 [ 880.051626] ? __save_stack_trace+0x7e/0xd0 [ 880.055926] should_fail+0x8c0/0xa40 [ 880.059615] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 880.064694] ? kasan_kmalloc+0xad/0xe0 [ 880.068556] ? __kmalloc_track_caller+0x15e/0x760 [ 880.073374] ? memdup_user+0x2c/0x90 [ 880.077061] ? strndup_user+0x62/0xb0 [ 880.080835] ? SyS_mount+0x3c/0x120 [ 880.084440] ? proc_fail_nth_write+0x9b/0x1d0 [ 880.088912] ? map_files_get_link+0x3a0/0x3a0 [ 880.093384] ? find_held_lock+0x35/0x1d0 [ 880.097430] ? check_same_owner+0x320/0x320 [ 880.101726] ? rcu_note_context_switch+0x710/0x710 [ 880.106630] ? __check_object_size+0x8b/0x530 [ 880.111104] should_failslab+0xec/0x120 [ 880.115053] __kmalloc_track_caller+0x5f/0x760 [ 880.119611] ? strncpy_from_user+0x430/0x430 [ 880.123998] ? strndup_user+0x62/0xb0 [ 880.127780] ? _copy_from_user+0x99/0x110 [ 880.131903] memdup_user+0x2c/0x90 [ 880.135422] strndup_user+0x62/0xb0 [ 880.139027] SyS_mount+0x6b/0x120 [ 880.142455] ? copy_mnt_ns+0xb30/0xb30 [ 880.146318] do_syscall_64+0x281/0x940 [ 880.150187] ? vmalloc_sync_all+0x30/0x30 [ 880.154309] ? _raw_spin_unlock_irq+0x27/0x70 [ 880.158783] ? finish_task_switch+0x1c1/0x7e0 [ 880.163251] ? syscall_return_slowpath+0x550/0x550 [ 880.168156] ? syscall_return_slowpath+0x2ac/0x550 [ 880.173063] ? prepare_exit_to_usermode+0x350/0x350 [ 880.178053] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 880.183390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 880.188209] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 880.193372] RIP: 0033:0x454e79 [ 880.196535] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 880.204218] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 2018/03/30 19:01:29 executing program 7 (fault-call:15 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 880.211463] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 880.218708] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 880.225953] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 880.233205] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 880.297576] FAULT_INJECTION: forcing a failure. [ 880.297576] name failslab, interval 1, probability 0, space 0, times 0 [ 880.308851] CPU: 1 PID: 26322 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 880.316123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.325477] Call Trace: [ 880.328070] dump_stack+0x194/0x24d [ 880.331707] ? arch_local_irq_restore+0x53/0x53 [ 880.336376] ? find_held_lock+0x35/0x1d0 [ 880.340450] should_fail+0x8c0/0xa40 [ 880.344174] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 880.349285] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 880.354468] ? find_held_lock+0x35/0x1d0 [ 880.358513] ? check_same_owner+0x320/0x320 [ 880.362817] ? rcu_note_context_switch+0x710/0x710 [ 880.367727] ? save_stack+0xa3/0xd0 [ 880.371341] should_failslab+0xec/0x120 [ 880.375302] kmem_cache_alloc+0x47/0x760 [ 880.379341] ? map_files_get_link+0x3a0/0x3a0 [ 880.383816] getname_flags+0xcb/0x580 [ 880.387594] user_path_at_empty+0x2d/0x50 [ 880.391720] do_mount+0x15f/0x2bb0 [ 880.395237] ? __might_fault+0x110/0x1d0 [ 880.399276] ? lock_downgrade+0x980/0x980 [ 880.403408] ? copy_mount_string+0x40/0x40 [ 880.407625] ? check_same_owner+0x320/0x320 [ 880.411933] ? __check_object_size+0x8b/0x530 [ 880.416425] ? __might_sleep+0x95/0x190 [ 880.420389] ? kasan_check_write+0x14/0x20 [ 880.424599] ? _copy_from_user+0x99/0x110 [ 880.428723] ? memdup_user+0x5e/0x90 [ 880.432420] ? copy_mount_options+0x1f7/0x2e0 [ 880.436897] SyS_mount+0xab/0x120 [ 880.440325] ? copy_mnt_ns+0xb30/0xb30 [ 880.444198] do_syscall_64+0x281/0x940 [ 880.448071] ? vmalloc_sync_all+0x30/0x30 [ 880.452199] ? _raw_spin_unlock_irq+0x27/0x70 [ 880.456675] ? finish_task_switch+0x1c1/0x7e0 [ 880.461148] ? syscall_return_slowpath+0x550/0x550 [ 880.466056] ? syscall_return_slowpath+0x2ac/0x550 [ 880.470961] ? prepare_exit_to_usermode+0x350/0x350 [ 880.475960] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 880.481308] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 880.486135] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 880.491316] RIP: 0033:0x454e79 2018/03/30 19:01:29 executing program 1: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r1, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r4, 0x0, 0x1000, 0xee, &(0x7f0000000c00)="4d950f9460ec3d2aec18ac353421ca144463062cb377072bceb22729532d38b0fb3ed7007e69de875e36d42046c407d1aae288dfc14ccc67f67f19665f49562ee3151198b972570019c92d16f3bb0f4c8c243b519641437df52f61a5c9f3bb93a40331190034ed1b6780361dd57710430ed7c40c63b4ab57c2b704fa3041d987a8370c94e467face29ca1d051b072b14848212e891bd789f7108a8397ae0de9bceeb2fc9c1f7f360b1c3a2b8caff61db19adb8a22010451356dd64294da04cfe0b3593425bd60a46afcc5a9cd21405a7e1e02efd36c416a0487070bf9852c7ac94364cfc7903f5ad0683f433cfd95568e63e40764e96a5f6f50dbc2c3651a96a435bb3f62deb37d5ad2bd516c20c3de1cf9f6de6631728ba90768628bfaa3295a3d997c2c2919512782342b5d035bce7aa822f314fe192ba3a3763e085cd9fb269acd23c6400a7513863570b608afdb5d9e2eabff8f9d97ffe5df648228ebd35b195774bd98c40baaac9990ecc5b0209f8988aa3aa61a88c15e36621462004eefb39c12f719b9138316669c74012b18365dc51d86263e41c74e8db7020aaa52464384d3f10bc5be5de4d48916cdf4e695cd6745db4af90145caf0b23140371fa51eb7472baea1f72e241e79833700078de4c2658b8dc0184378ac3cb25266dcfb9cba2a1b142e5cbc1f4259f72b9e65a021eaab7feea75c64635f1b1e06cb52c05503a1c6ef3a44b0b28c7ec8552fd7ff1ac74fb5eb09a634c716ff1238a205c90dddf7f28d6327efde13903f9fa4d7693d872cf575181ccea5fbf26a8708e01dfba6b503ce8fe2f9390d8f135a965e42e03ecc867e8d041cc649e731a540c4a4ae9774aac3523c597ab922b6aeca30199b7c12bc2e1b80f6cd1f3ec3b050cfd47cf99080c88e806c3e904ace64df1aed08318827b3d0287b74accc9119741959976750b4bb964fee6a2fecf2b2ff73248a08ae481533a501440f212852772f26d8eef7592a2cbf79593cde09a24477fd215f8d8276642e22ae73c18da0cf7a9afeae10ac0b3ab2a4f558fded2513bf151ccb3335f29e156d4692e9f7f5054b44531e76baef24a2789e9eebcb14247cedabdf35a2db307fb286f52158dd15009b584eecfd168f74a30a60d42062832023dbedb15443f777aee6ea1d155c1a6e2addfd4ebd34dfe884fde928e00fed974402030bae7e2def33d4fbc0f42df14a840e2f91ab39fbe7d6da27a61805836dce9b8d0da62d4f0b43c1dd452d59c8246da307984bc58f33033af87c322f7ecb7807601e8ea9f42233d26ca8a7985ff5b5ba2c07d83228f3bea0e562d540e4c1a7883366d042438635cddeb215ee865a8c7c0eb6470c20ee51aae4ebf6e87316b8bf83199d63a2ee0dbfbb413019f1242b893456973b89e744893af7c2b8b905d8601c3436ea5d01f132bc5b08878759f2a9f0cc4f0ba0fbfa41dfb9a7ecdbab08bba8e9c1b3e06a7d6940c02c0223d99b94e30ae454c26e93c0f0885858e492f56dbdda7acd3ed2fd4f372336873f8ebcddf608c57290b386f130d138b3c1ba9005896d3d5481345be419073fab52adec57b3c9fad8b2de91c043c4262405f0554b5dd58ca4d020befdc949eeba0b5c7bac837f8b19453ee957521cd4d2313151f4d00d1d53e24dd90f2d53034b0f9cc71ecc73dd1e8cfd6b316170034de692e5e486a276653645b9f8982718161599603efcee2a328ead00eef08550e01eafe5f89ecae4528d17bb70d9b8ac47a85783b25003d22be40f1cae0a79b60f34ee2c6d016c0a7763f55bf155dc0136c212ad4fc0c0efdd2a3b6c212faf1e080aabe40b5838d172a0b24ff962f80c2f1c0283e7a2f203fe6369b3aa375a62707a10fafb2265714882e50d17828e2917d38f91a37e59d5b57fe3c8464d14484a3654ab78112bfb6397fdfa29eb28d64dff160dbe8c445c5206f9d2eadfe41b54283049cb8d66a53b48755596e1ac913b34a148a4384afc0c29833b2fd1e9bc61da2f28695de7b38290f415c3747768ff405c0f4f438d31fd4c774bb2280d62e0d253aeda2a6ae1fafdb0c2570255ae04887aa1158621ec624d1d1fe1aeb02c9b83d434fd3ca30b794dc26eee241ddf19048c52fd90ea9063859042a3ed1bd82b13205ef3c0deadc64e17d18946a2020604ea985864e99e336b12a641542b1cf5f8799ad0a6910333635ff94ad3458da4628727e2c19f34f261026d24e569d08f35c4c207014055a6dc61297efb67746394959a2f41b9a0fb3fc77e480f5546e21dabffbdd7a53422b7711674a155abcfa438fe9c345027ac6f823fc9d38315b1f907c1a6a85df84ccc745323bafbe63f2db3d53cc661bb6799ec36562f39f585ce2a0f067ea3182aef16c262430860fbe096fd1e62235a443627f556a4bd2b2aa9d06188bc70e1c331a85b54c967b8c59eceab52a41543a4d99f81161b2889b3f4edc5fefb02d6cc92fc0ae93b8d7a27f7ff80b87cc7bc40a82729b0fb08e0004a6671230abe3e72b16e9f6006e066e7b7da4f1b77aded3ac3a959430949eff8a8eacf1f0adb4ed489250b4e686c41328f68b897cec0d391d0744ef9c03425ac44588fb6bda5f1c21a1c7336dd81a188d6c987121ae36c49b5f91f23e8a166a941c0f2ab8b4c2104f09bc8c414108c1904baebb07ec7826e6e23a24623bf6da67b883446c515d2d86eaf8ba2c1dfb221b47cff64a8bc4c6ba6802e8a7e2d6c505018aef79247ba3e5c9703c8d45851d9055fdd7d605458980ea76d1f868b52a7408c1f1e3a6d86e2422041d08f7afb2a40b78efddd18c2e8bd04933b38d4bbd105d88a38b949409c1a2f3662b2bc53be554d920e49e70ef04fce1bdcc2e7ef54571058ee90204a5d44cdfa9e3863f8306c59a5b4b03cbb8af9fd20c77d69d1493b66b4698669a8eafb86005ba8a74e78734a004540e74d9be19916b9fe9507c516b465f53aca4a11544f527307af5d2a28974610a14e1987626cc05052b5acc4b935cd47e0b8a9ba61977255c5fab77b83da295795297f9c17a6dd1cff310684829f9b825181fae5ce676e758ba163c02d937af5e60a1833dacbd4611ca25ef7f68683f0a50e6318dccfff19f1f28100e5fa47e0b13332fa05caef031e2b3a7f75050da522a4871019252c0e75225b06d03f18536e6209e67481fa1563952ce422026e274bd5558f6d10284e272f13e984eb0550aa74a0ea88507555acb84221d8644410b15211ee1712306ee533e3dfeb543ecb11fa7470753a14af4b539ea200dde2622591ffed235541ea2f263f6007e6c9587eca0e728a7c9c2b84226b43563948fb4817a3e097fc82423778ccffc4977cd2bce71ae2487df05d7bf7bfa78099ba40deefb0cae5f1dcc740b99d649ef84134f5dde36d63bada8bafb5f3606642f92432d3fdf8b122f54579406395fd3b375a532513db5a0d513eb9a14da818bd5a28abd7cc22504e02a1e2ce2b35c18d989ed411481911ebe3d7cb689bc2c1e895c33ce2483385ce9ef313aa343f3a60b58c7cb502e533bb7b5fcdd2d8c68f1485ed79314a78960034bbf515c6e161216706d38830fc0f9baaa66b937f63f233e2a79864b2fd818c1959adfe815781b5e1b46519fa20957421b6ea47db245c0a62692898ecc6a0b70a941a467ddf699fcbbf7af88abce1b6808abeeaf73548922f7291cf562891b0ef5ee7e7d0b080f84782e25717f3beb3d9453a16cd14001d861d0307445fa0430c28c174282bf1365e6a8d8a6aaac806c94a3121f2c8cb4351d79e9ec8def364167322ee2e66aa66984a1b807fef91d7dcf3ea81057a5a63206224ad46781abc7068de06db763f6ecdfb66b55f2e8f10ae55679f82d46b8ec589478dcba9a09441b9d282d41f9ceb403afcbc7e6fea62eb9e342a3eb6ded5f3171e77aad14ca230f6f121930669fa1a6be7816515346a61415e541dbd67e5121c0536a11dcc0ea5ac98ec94655e3a2493eadb5eb8c8608f3774e87e065c9f5b1458ec2a0355c182a6d9455eab53745dc0db328f61489adc7e29472aafd1c7c70784c087f7dd0a04a7a9c2c48c104de2c9f732a9ee8917168c072a09b924d508f8e504453f05ef12be791df6a8783ed898177787b989c4e2578c502638f9e3a8840c8d679df009e0f86060820abf84abd0a1ad01435b9f9f9aa58e3184aff361e051bf7107dc142a146ca770da11d735ed593f8f8ee61b19fc509dae6c1ff9af9cdb278045205bd7ff1ef4f421ccbcc3cb573afb2f648b1fe17fc5e33a62961f831eeab53f82dfb864dea7c02bf20630563c324304de9dd0eaa84ed9bbb3b422b643b3a3c563371c541f8989df3b0073f63d5d5fb309bfd6710524af664df40d5186231ee4875753a2d1a927a877122bd7c96bc16dbec1115079a21bddbfd961c70215ab25618d56d193e0389bc148deaa9fc5cc878387a0604b2936c6cff2f57b3eaa302b6a9270c48a98718b6f06996e02df24eaa337960d06443252b2eaa80131043e28709458fc9dfa3f8fc8b593237c974a49447094afd36795da9cdf073da007d5a3043aee7772864ec28ce776544779b32fcba569542b29cb80f7a7e438f49d8f3fd1e233db7088b9afa26e643d2745d2484bf9a6092111cdcf752e84525a2019fe938b0e42dfae3c9da10ad02b038eda57176fc392e5e4222a9f227854f382aa5db15ef6bef183b5091a71bf897ba2e232d6119c73f3926de56e0089cb83f90700474b79b8f3d9444c519e2f0a1df482f95762e597dd0060067e6a293a4f643d1e0fffb812721cb875d7ca454958773adf8fd2ceb525a1ada070e364d3e130e388863924394cef8e8500e496d0568d62f89bf9c9f5ad08aece1aca1ae25a2ce27abc35de7f4254ff95d710ab8333c06586c34d028243c89a11579fcd27e4048f175349284e7297f3b6187fa90e7059e65eca1ac6f5918c4f739785d05b589ca8b91ede63e27221d233bfd0300bb07c4718f4b439c03b96b1a3834ae260ba8ed3c2523ce20679b31c7d4410ff260f6b63758e2325a3d10132dc8102fb31ea8496a67b3174204a56be43f1c51fc18483118068db4b574c9fefd502ca1e9ab0fbe8028ebe10ab78e7b43a9221dbe1068f286b8b572ce97ee713b6e261113df4c33415c90fc7b43fad3c621cbec0557c82691babe0ea60614bc86c39fa8088fcfc3cae06ac36de4eaf80e8a0f4e9923130f3ed486cba296dfc55dc790e461d036571fa4fefacabaed4a115d036a1e44e1b8aa14bdd8648215e32af7f38e7bda8dee5d7042a1ea6727c545b6a263a5cfdb09c12aef3b97367a95eb3b91dfad7a8a08540f13adf518e0307ae7a20e3e33a7d775be0a4db7a26b474851e67d1610feea4c7bd5da0d7ba6b268a69266e6ef7f4d82842e6dcb57e1f8db95c5b4e9f2de50e67a06c9a983a1fc3bfc4075732bb9da4524bd495af5a15d7a5ebe60e045f13b2e372aca6cbe0063f823366f745d08344340c24c731bd36a7395926842601207dcbf699a9fc87ab74c4b1b29c24cccf1a4b859ca2ad9851c7cb848503b3e816e02a6aa29fdbe42654d2edf983fc2bef3f02cfa3102a70ac94eef92ab06d9b38313b38b215ae02b248a76aa8085411965ec95d358779ac0eeb2f800970e1488b399a9103e00854d9d41a79c4823024e3ae75a9d2ef4448101cc54ecf0a1b9dd149224bc33d0652e62e5fa84ffe41651ba9113acb208c5a2cd1227895133e101cf83381bf241dcf265a4b95c9eb053165757804cfdff490547c7e1a364e5263871c2b717b355f5d61c5a628f55", &(0x7f0000000500)=""/238, 0xffffffffffffff01, 0x8}, 0x28) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x10000005, 0x102, 0x56c96e7a, 0x5b0, 0x400a, r4, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000200)) [ 880.494485] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 880.502182] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 880.509433] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 880.516683] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 880.523928] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 880.531175] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/30 19:01:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 7 (fault-call:15 fault-nth:3): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r4, &(0x7f0000007500)={&(0x7f0000007280)=@hci={0x0, 0x0}, 0x80, &(0x7f00000073c0)=[{&(0x7f0000007300)=""/129, 0x81}], 0x1, &(0x7f0000007400)=""/252, 0xfc, 0x2}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000007540)={0xd, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0x100, 0x2d, &(0x7f0000000500)=""/45, 0x41000, 0x1, [], r5}, 0x48) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000540)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) close(r0) socketpair(0x2000002, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x5) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x0, 0x40, 0x1, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:29 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 880.760971] FAULT_INJECTION: forcing a failure. [ 880.760971] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 880.772813] CPU: 1 PID: 26356 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 880.780085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.789437] Call Trace: [ 880.792025] dump_stack+0x194/0x24d [ 880.795664] ? arch_local_irq_restore+0x53/0x53 [ 880.800337] should_fail+0x8c0/0xa40 [ 880.804059] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 880.809167] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 880.814364] ? print_irqtrace_events+0x270/0x270 [ 880.819125] ? __sched_text_start+0x8/0x8 [ 880.823265] ? trace_hardirqs_off+0x10/0x10 [ 880.827572] ? print_irqtrace_events+0x270/0x270 [ 880.832308] ? lock_acquire+0x1d5/0x580 [ 880.836274] ? find_held_lock+0x35/0x1d0 [ 880.840311] ? __lock_acquire+0x664/0x3e00 [ 880.844524] ? should_fail+0x23b/0xa40 [ 880.848478] __alloc_pages_nodemask+0x327/0xdd0 [ 880.853150] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 880.858149] ? find_held_lock+0x35/0x1d0 [ 880.862210] ? check_same_owner+0x320/0x320 [ 880.866529] cache_grow_begin+0x72/0x640 [ 880.870576] kmem_cache_alloc+0x400/0x760 [ 880.874703] ? map_files_get_link+0x3a0/0x3a0 [ 880.879177] getname_flags+0xcb/0x580 [ 880.882954] user_path_at_empty+0x2d/0x50 [ 880.887092] do_mount+0x15f/0x2bb0 [ 880.890614] ? __might_fault+0x110/0x1d0 [ 880.894654] ? lock_downgrade+0x980/0x980 [ 880.898790] ? copy_mount_string+0x40/0x40 [ 880.903011] ? check_same_owner+0x320/0x320 [ 880.907331] ? __check_object_size+0x8b/0x530 [ 880.911822] ? __might_sleep+0x95/0x190 [ 880.915779] ? kasan_check_write+0x14/0x20 [ 880.919989] ? _copy_from_user+0x99/0x110 [ 880.924122] ? memdup_user+0x5e/0x90 [ 880.927818] ? copy_mount_options+0x1f7/0x2e0 [ 880.932289] SyS_mount+0xab/0x120 [ 880.935720] ? copy_mnt_ns+0xb30/0xb30 [ 880.939624] do_syscall_64+0x281/0x940 [ 880.943491] ? vmalloc_sync_all+0x30/0x30 [ 880.947623] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 880.953149] ? syscall_return_slowpath+0x550/0x550 [ 880.958064] ? syscall_return_slowpath+0x2ac/0x550 [ 880.962973] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 880.968315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 880.973135] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 880.978307] RIP: 0033:0x454e79 [ 880.981484] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 880.989171] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 880.996425] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 881.003672] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 19:01:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) r1 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x4992c766, 0xff, 0x83, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x8, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x2000030, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0xffffffffffffffff, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) 2018/03/30 19:01:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 7 (fault-call:15 fault-nth:4): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 881.010923] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 881.018176] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 2018/03/30 19:01:30 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x9, 0x8, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) [ 881.164670] FAULT_INJECTION: forcing a failure. [ 881.164670] name failslab, interval 1, probability 0, space 0, times 0 [ 881.175973] CPU: 1 PID: 26380 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 881.183250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.192603] Call Trace: [ 881.195197] dump_stack+0x194/0x24d [ 881.198830] ? arch_local_irq_restore+0x53/0x53 [ 881.203503] ? lock_downgrade+0x980/0x980 [ 881.207669] should_fail+0x8c0/0xa40 2018/03/30 19:01:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r0, &(0x7f0000000500)="ea3f57ce20436f453cc01881b475877a8f024079906796e6b545168220b21ca88b801d87a860c638dbcf733a4a40f5d4b502d4f76527e8805a0632e885112de4c2ac2bada0bb1ec83355f47e1106c2f401c4f8e06ad9c77928ce64c7167be628db9fea59e60111d4c21e58e6c214183270bddcea275221e088f800033fe130d205e90a2af5797ba257a41f69c29e", &(0x7f0000000700)=""/65}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={r3, &(0x7f0000000c00)="3b29cf12b1618bbf5a057e07eac686ecddac5d8e12e2caff06fdebf045b10e661111a7a435c63829d914d395bc8b164d6526ed48b9c5e2354964617191de2a8ec2db906e573b4b8989a188c817d767ea693b75fedd80fb2d7d21b4a0621c71e3b8178d6d8be9834a9c37a4b30ab9cb1c781f7b31c63009d208bddfe8d50291531a6bb2d56a1bfc8d6e43182c0074a5f5cdf493925c66668a9257379c4343d8998184f77fb4f34091319c77f638368b0caac326479655e2159db85d9fe09579ec6fd9f5b877b4b741706d9bc92ebcda0eb7b1723fa45de79cc2ba42c09240180677", &(0x7f00000005c0)=""/53}, 0x18) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000280)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 881.211388] ? trace_hardirqs_off+0x10/0x10 [ 881.215700] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 881.220803] ? is_bpf_text_address+0xa4/0x120 [ 881.225314] ? find_held_lock+0x35/0x1d0 [ 881.229384] ? check_same_owner+0x320/0x320 [ 881.233685] ? putname+0xee/0x130 [ 881.237113] ? filename_lookup+0x315/0x500 [ 881.241322] ? user_path_at_empty+0x40/0x50 [ 881.245636] ? rcu_note_context_switch+0x710/0x710 [ 881.250569] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 881.255932] should_failslab+0xec/0x120 [ 881.259886] kmem_cache_alloc+0x47/0x760 [ 881.263946] ? free_obj_work+0x690/0x690 [ 881.267996] alloc_vfsmnt+0xe0/0x9c0 [ 881.271703] ? path_lookupat+0x238/0xba0 [ 881.275748] ? mnt_free_id.isra.21+0x50/0x50 [ 881.280135] ? trace_hardirqs_off+0x10/0x10 [ 881.284446] ? putname+0xee/0x130 [ 881.287879] ? putname+0xee/0x130 [ 881.291325] ? rcu_read_lock_sched_held+0x108/0x120 [ 881.296326] ? find_held_lock+0x35/0x1d0 [ 881.300385] ? __get_fs_type+0x8a/0xc0 [ 881.304249] ? lock_downgrade+0x980/0x980 [ 881.308372] ? module_unload_free+0x5b0/0x5b0 [ 881.312843] ? lock_release+0xa40/0xa40 [ 881.316803] ? mpi_resize+0x200/0x200 [ 881.320592] vfs_kern_mount.part.26+0x84/0x4a0 [ 881.325152] ? may_umount+0xa0/0xa0 [ 881.328762] ? _raw_read_unlock+0x22/0x30 [ 881.332891] ? __get_fs_type+0x8a/0xc0 [ 881.336761] do_mount+0xea4/0x2bb0 [ 881.340278] ? __might_fault+0x110/0x1d0 [ 881.344316] ? copy_mount_string+0x40/0x40 [ 881.348523] ? check_same_owner+0x320/0x320 [ 881.352827] ? __check_object_size+0x8b/0x530 [ 881.357299] ? __might_sleep+0x95/0x190 [ 881.361260] ? kasan_check_write+0x14/0x20 [ 881.365474] ? _copy_from_user+0x99/0x110 [ 881.369682] ? memdup_user+0x5e/0x90 [ 881.373374] ? copy_mount_options+0x1f7/0x2e0 [ 881.377850] SyS_mount+0xab/0x120 [ 881.381277] ? copy_mnt_ns+0xb30/0xb30 [ 881.385143] do_syscall_64+0x281/0x940 [ 881.389004] ? vmalloc_sync_all+0x30/0x30 [ 881.393134] ? _raw_spin_unlock_irq+0x27/0x70 [ 881.397601] ? finish_task_switch+0x1c1/0x7e0 [ 881.402072] ? syscall_return_slowpath+0x550/0x550 [ 881.406974] ? syscall_return_slowpath+0x2ac/0x550 [ 881.411876] ? prepare_exit_to_usermode+0x350/0x350 [ 881.416874] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 881.422219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 881.427045] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 881.432216] RIP: 0033:0x454e79 [ 881.435389] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 881.443087] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 881.450334] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 881.457584] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 881.464833] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 881.472087] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/30 19:01:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xf, 0x5, 0x7fff, 0x8000, 0x10, 0xffffffffffffff9c, 0xfffffffffffffff8}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x3, 0x4, 0x1, 0x0, r0}, 0xcc) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x101, 0x5, 0x8, 0x0, r1, 0x3, [0x115]}, 0x1f) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:30 executing program 7 (fault-call:15 fault-nth:5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 3 (fault-call:17 fault-nth:0): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x8b) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, &(0x7f0000000680)="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"}, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000c00)="195fae9e005b4b97e50d5938c3fa60027ae193b809b9adc739107f07e0769025f95ad4084ccefc2a2c75ec3e16bc086bb0505093bb8d987fd0bf5c48288e28b0ed6bff4c462da1a82fa5ec9b2c6ad5a79ac5db7bf376ee965ecc3e5b67ff68fe6f97968840b418004811c6dc3ff085b0b421168240ce1b7722fa7bbd32120d4a88bb2d53047d3427916450db5825e496bea5e7291df2172e0964ad54e1b9d53b27ae6b4e20d5dc1f118fd5fa1a09baef2894310e1440d59c83fbb6575f2056aaa5856af44b0eb1750cbd33f84e0cc11f4aa0d798955ba5054e445425abfc", &(0x7f0000000200)=""/34}, 0x18) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000500)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x200) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)={0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x4, 0x3, 0x1, 0x4, 0x9, r4, 0x3}, 0x2c) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socket$kcm(0x29, 0x5, 0x0) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000580)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 881.748365] FAULT_INJECTION: forcing a failure. [ 881.748365] name failslab, interval 1, probability 0, space 0, times 0 [ 881.759793] CPU: 1 PID: 26432 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 881.760859] FAULT_INJECTION: forcing a failure. [ 881.760859] name failslab, interval 1, probability 0, space 0, times 0 [ 881.767066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.767072] Call Trace: [ 881.767090] dump_stack+0x194/0x24d [ 881.767105] ? arch_local_irq_restore+0x53/0x53 [ 881.767125] ? __unwind_start+0x169/0x330 [ 881.802597] ? __kernel_text_address+0xd/0x40 [ 881.807084] should_fail+0x8c0/0xa40 [ 881.810780] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 881.815867] ? save_stack+0xa3/0xd0 [ 881.819476] ? save_stack+0x43/0xd0 [ 881.823083] ? kasan_kmalloc+0xad/0xe0 [ 881.826952] ? kasan_slab_alloc+0x12/0x20 [ 881.831078] ? kmem_cache_alloc+0x12e/0x760 [ 881.835378] ? alloc_vfsmnt+0xe0/0x9c0 [ 881.839244] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 881.843978] ? do_mount+0xea4/0x2bb0 [ 881.847679] ? find_held_lock+0x35/0x1d0 [ 881.851730] ? check_same_owner+0x320/0x320 [ 881.856036] ? rcu_note_context_switch+0x710/0x710 [ 881.860952] should_failslab+0xec/0x120 [ 881.864907] __kmalloc_track_caller+0x5f/0x760 [ 881.869475] ? do_raw_spin_trylock+0x190/0x190 [ 881.874037] ? kstrdup_const+0x39/0x50 [ 881.877907] kstrdup+0x39/0x70 [ 881.881079] kstrdup_const+0x39/0x50 [ 881.884773] alloc_vfsmnt+0x1a5/0x9c0 [ 881.888554] ? path_lookupat+0x238/0xba0 [ 881.892595] ? mnt_free_id.isra.21+0x50/0x50 [ 881.896986] ? trace_hardirqs_off+0x10/0x10 [ 881.901292] ? putname+0xee/0x130 [ 881.904727] ? putname+0xee/0x130 [ 881.908159] ? rcu_read_lock_sched_held+0x108/0x120 [ 881.913156] ? find_held_lock+0x35/0x1d0 [ 881.917201] ? __get_fs_type+0x8a/0xc0 [ 881.921070] ? lock_downgrade+0x980/0x980 [ 881.925197] ? module_unload_free+0x5b0/0x5b0 [ 881.929672] ? lock_release+0xa40/0xa40 [ 881.933640] ? mpi_resize+0x200/0x200 [ 881.937423] vfs_kern_mount.part.26+0x84/0x4a0 [ 881.941990] ? may_umount+0xa0/0xa0 [ 881.945601] ? _raw_read_unlock+0x22/0x30 [ 881.949732] ? __get_fs_type+0x8a/0xc0 [ 881.953603] do_mount+0xea4/0x2bb0 [ 881.957126] ? __might_fault+0x110/0x1d0 [ 881.961170] ? copy_mount_string+0x40/0x40 [ 881.965384] ? check_same_owner+0x320/0x320 [ 881.969692] ? __check_object_size+0x8b/0x530 [ 881.974175] ? __might_sleep+0x95/0x190 [ 881.978135] ? kasan_check_write+0x14/0x20 [ 881.982349] ? _copy_from_user+0x99/0x110 [ 881.986481] ? memdup_user+0x5e/0x90 [ 881.990174] ? copy_mount_options+0x1f7/0x2e0 [ 881.994651] SyS_mount+0xab/0x120 [ 881.998086] ? copy_mnt_ns+0xb30/0xb30 [ 882.001955] do_syscall_64+0x281/0x940 [ 882.005824] ? vmalloc_sync_all+0x30/0x30 [ 882.009954] ? _raw_spin_unlock_irq+0x27/0x70 [ 882.014430] ? finish_task_switch+0x1c1/0x7e0 [ 882.018909] ? syscall_return_slowpath+0x550/0x550 [ 882.023818] ? syscall_return_slowpath+0x2ac/0x550 [ 882.028729] ? prepare_exit_to_usermode+0x350/0x350 [ 882.033728] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 882.039078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.043917] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 882.049086] RIP: 0033:0x454e79 [ 882.052254] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 882.059944] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 882.067194] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 882.074447] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 882.081720] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 882.088968] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 882.096231] CPU: 0 PID: 26434 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 882.103502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.112846] Call Trace: [ 882.115428] dump_stack+0x194/0x24d [ 882.119046] ? arch_local_irq_restore+0x53/0x53 [ 882.123700] should_fail+0x8c0/0xa40 [ 882.127400] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 882.132488] ? lock_downgrade+0x980/0x980 [ 882.136615] ? get_pid_task+0xbc/0x140 [ 882.140494] ? proc_fail_nth_write+0x9b/0x1d0 [ 882.144984] ? map_files_get_link+0x3a0/0x3a0 [ 882.149475] ? find_held_lock+0x35/0x1d0 [ 882.153524] ? check_same_owner+0x320/0x320 [ 882.157838] ? __lock_is_held+0xb6/0x140 [ 882.161876] ? rcu_note_context_switch+0x710/0x710 [ 882.166793] should_failslab+0xec/0x120 [ 882.170756] __kmalloc_track_caller+0x5f/0x760 [ 882.175327] ? strncpy_from_user+0x430/0x430 [ 882.179722] ? strndup_user+0x62/0xb0 [ 882.183499] memdup_user+0x2c/0x90 [ 882.187021] strndup_user+0x62/0xb0 [ 882.190639] SyS_mount+0x3c/0x120 [ 882.194074] ? copy_mnt_ns+0xb30/0xb30 [ 882.197955] do_syscall_64+0x281/0x940 [ 882.201824] ? vmalloc_sync_all+0x30/0x30 [ 882.205946] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 882.211467] ? syscall_return_slowpath+0x550/0x550 [ 882.216379] ? syscall_return_slowpath+0x2ac/0x550 [ 882.221287] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 882.226645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.231473] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 882.236640] RIP: 0033:0x454e79 [ 882.239819] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:01:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 882.247516] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 882.254768] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 882.262019] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 882.269270] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 882.276515] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/30 19:01:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) 2018/03/30 19:01:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:31 executing program 7 (fault-call:15 fault-nth:6): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:31 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:31 executing program 3 (fault-call:17 fault-nth:1): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 882.430523] FAULT_INJECTION: forcing a failure. [ 882.430523] name failslab, interval 1, probability 0, space 0, times 0 [ 882.441984] CPU: 1 PID: 26458 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 882.449266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.458642] Call Trace: [ 882.461257] dump_stack+0x194/0x24d [ 882.464907] ? arch_local_irq_restore+0x53/0x53 [ 882.469596] ? finish_task_switch+0x1c1/0x7e0 [ 882.474121] ? finish_task_switch+0x182/0x7e0 [ 882.478646] should_fail+0x8c0/0xa40 [ 882.482384] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 882.487506] ? retint_kernel+0x10/0x10 [ 882.491402] ? __sched_text_start+0x8/0x8 [ 882.495532] ? lock_release+0x503/0xa40 [ 882.499491] ? check_same_owner+0x320/0x320 [ 882.503785] ? sget_userns+0x27d/0xe40 [ 882.507654] should_failslab+0xec/0x120 [ 882.511606] kmem_cache_alloc_trace+0x4b/0x740 [ 882.516167] ? security_capable+0x8e/0xc0 [ 882.520293] sget_userns+0x2a3/0xe40 [ 882.523979] ? set_anon_super+0x20/0x20 [ 882.527930] ? put_filp+0x90/0x90 [ 882.531359] ? destroy_unused_super.part.6+0xd0/0xd0 [ 882.536441] ? alloc_vfsmnt+0x762/0x9c0 [ 882.540389] ? path_lookupat+0x238/0xba0 [ 882.544428] ? mnt_free_id.isra.21+0x50/0x50 [ 882.548822] ? trace_hardirqs_off+0x10/0x10 [ 882.553121] ? putname+0xee/0x130 [ 882.556550] ? cap_capable+0x1b5/0x230 [ 882.560420] ? security_capable+0x8e/0xc0 [ 882.564615] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 882.569783] ? ns_capable_common+0xcf/0x160 [ 882.574081] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 882.579246] mount_ns+0x6d/0x190 [ 882.582592] rpc_mount+0x9e/0xd0 [ 882.585943] mount_fs+0x66/0x2d0 [ 882.589288] vfs_kern_mount.part.26+0xc6/0x4a0 [ 882.593849] ? may_umount+0xa0/0xa0 [ 882.597453] ? _raw_read_unlock+0x22/0x30 [ 882.601576] ? __get_fs_type+0x8a/0xc0 [ 882.605439] do_mount+0xea4/0x2bb0 [ 882.608957] ? __might_fault+0x110/0x1d0 [ 882.612994] ? copy_mount_string+0x40/0x40 [ 882.617210] ? check_same_owner+0x320/0x320 [ 882.621509] ? __check_object_size+0x8b/0x530 [ 882.625979] ? __might_sleep+0x95/0x190 [ 882.629933] ? kasan_check_write+0x14/0x20 [ 882.634142] ? _copy_from_user+0x99/0x110 [ 882.638266] ? memdup_user+0x5e/0x90 [ 882.641953] ? copy_mount_options+0x1f7/0x2e0 [ 882.646422] SyS_mount+0xab/0x120 [ 882.649848] ? copy_mnt_ns+0xb30/0xb30 [ 882.653725] do_syscall_64+0x281/0x940 [ 882.657588] ? vmalloc_sync_all+0x30/0x30 [ 882.661712] ? _raw_spin_unlock_irq+0x27/0x70 [ 882.666183] ? finish_task_switch+0x1c1/0x7e0 [ 882.670655] ? syscall_return_slowpath+0x550/0x550 [ 882.675559] ? syscall_return_slowpath+0x2ac/0x550 [ 882.680465] ? prepare_exit_to_usermode+0x350/0x350 [ 882.686143] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 882.691489] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.696311] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 882.701476] RIP: 0033:0x454e79 [ 882.704640] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 882.712322] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 882.719566] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 882.726811] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 882.734056] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 882.741303] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 882.782920] FAULT_INJECTION: forcing a failure. [ 882.782920] name failslab, interval 1, probability 0, space 0, times 0 [ 882.794231] CPU: 1 PID: 26463 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 882.801502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.810857] Call Trace: [ 882.813449] dump_stack+0x194/0x24d [ 882.817082] ? arch_local_irq_restore+0x53/0x53 [ 882.821754] ? __save_stack_trace+0x7e/0xd0 [ 882.826074] should_fail+0x8c0/0xa40 [ 882.829768] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 882.834846] ? kasan_kmalloc+0xad/0xe0 [ 882.838706] ? __kmalloc_track_caller+0x15e/0x760 [ 882.843535] ? memdup_user+0x2c/0x90 [ 882.847232] ? strndup_user+0x62/0xb0 [ 882.851025] ? SyS_mount+0x3c/0x120 [ 882.854636] ? proc_fail_nth_write+0x9b/0x1d0 [ 882.859106] ? map_files_get_link+0x3a0/0x3a0 [ 882.863577] ? find_held_lock+0x35/0x1d0 [ 882.867621] ? check_same_owner+0x320/0x320 [ 882.871923] ? rcu_note_context_switch+0x710/0x710 [ 882.876830] ? __check_object_size+0x8b/0x530 [ 882.881307] should_failslab+0xec/0x120 [ 882.885258] __kmalloc_track_caller+0x5f/0x760 [ 882.889816] ? strncpy_from_user+0x430/0x430 [ 882.894198] ? strndup_user+0x62/0xb0 [ 882.897971] ? _copy_from_user+0x99/0x110 [ 882.902094] memdup_user+0x2c/0x90 [ 882.905618] strndup_user+0x62/0xb0 [ 882.909218] SyS_mount+0x6b/0x120 [ 882.912643] ? copy_mnt_ns+0xb30/0xb30 [ 882.916515] do_syscall_64+0x281/0x940 [ 882.920375] ? vmalloc_sync_all+0x30/0x30 [ 882.924495] ? _raw_spin_unlock_irq+0x27/0x70 [ 882.928974] ? finish_task_switch+0x1c1/0x7e0 [ 882.933451] ? syscall_return_slowpath+0x550/0x550 [ 882.938354] ? syscall_return_slowpath+0x2ac/0x550 [ 882.943255] ? prepare_exit_to_usermode+0x350/0x350 [ 882.948244] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 882.953581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 882.958403] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 882.963566] RIP: 0033:0x454e79 [ 882.966727] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 882.974407] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 2018/03/30 19:01:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x1, &(0x7f0000000200)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 882.981648] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 882.988900] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 882.996150] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 883.003397] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 2018/03/30 19:01:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r2, 0x3, 0x1}, 0x14) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x37, 0x10}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000000)="1310d3a6109a1d22ccd8ad4df5e827a8cffc642010de80aa5997792cc73b7574f1b4bc1df7ef7bdc2f96a2e57c87028b1db1ce34cd65678dca4b4a16492e9fcec98a6ecaa3f6fcaf4fec70e02a4843bda946d11284be8c01df965efd51abb65d481d50d5ed5cd2382c45ad92283b040296b1b13d67b3c60e185e9457ac1da8cdac200922262e2571bdfd1c662a017b2b07110953569b79d5d8f5d8f8cd47955b3d9fdb6d275a76ee0e399469051ef87f781349dbbd43987adea6a69d332e39ef3d2534c376fc7c484472bcc5", &(0x7f0000000100)=""/115}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000680)="0000000000a9391eab87e1248f59da4814ca94b2b9ea84ff6b723492ce1a5c66c4d6205caba723f3c354b29a82e7cafd698c66b1cb86fdbd3ceb14ae02000000d06d2daaa1c5564a5966c908ca84074f771a9edb697427fd25a2eb82eed447345e47831afc868d89a61b1e0abc079d0e585586219b898eb4334265b4befb95c7eafa250d5a7efbfab03dad4c5864dac998498d93b06e8f669e55c55ff64f1a66ebd40cd6") perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) getpid() socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000240)={&(0x7f00000002c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000580)=""/68, 0xa, 0x8}, 0x40) recvmsg$kcm(r2, &(0x7f0000005440)={&(0x7f0000003e40)=@can={0x0, 0x0}, 0x80, &(0x7f0000005380)=[{&(0x7f0000003ec0)=""/127, 0x7f}, {&(0x7f0000003f40)}, {&(0x7f0000003f80)=""/34, 0x22}, {&(0x7f0000003fc0)=""/162, 0xa2}, {&(0x7f0000004080)=""/206, 0xce}, {&(0x7f0000004180)=""/19, 0x13}, {&(0x7f00000041c0)=""/239, 0xef}, {&(0x7f00000042c0)=""/4096, 0x1000}, {&(0x7f00000052c0)=""/182, 0xb6}], 0x9, 0x0, 0x0, 0x3}, 0x10000) bpf$PROG_LOAD(0x5, &(0x7f0000005480)={0x7, 0xe, &(0x7f0000000400)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r3}, @jmp={0x5, 0x8001, 0xf, 0x3, 0x8, 0x102, 0xfffffffffffffff4}, @exit={0x95}, @exit={0x95}, @generic={0x9, 0x2, 0x3000000000, 0x8001}, @map={0x18, 0x0, 0x1, 0x0, r2}, @generic={0x7fffffff, 0x4, 0x88b, 0xd75d}], &(0x7f0000000380)='syzkaller\x00', 0x80000000, 0x5, &(0x7f0000000480)=""/5, 0x41100, 0x0, [], r5}, 0x48) 2018/03/30 19:01:32 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:32 executing program 7 (fault-call:15 fault-nth:7): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:32 executing program 3 (fault-call:17 fault-nth:2): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:32 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 883.080581] FAULT_INJECTION: forcing a failure. [ 883.080581] name failslab, interval 1, probability 0, space 0, times 0 [ 883.092146] CPU: 1 PID: 26475 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 883.099423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.108774] Call Trace: [ 883.111352] dump_stack+0x194/0x24d [ 883.114970] ? arch_local_irq_restore+0x53/0x53 [ 883.119626] should_fail+0x8c0/0xa40 [ 883.123323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 883.128415] ? find_next_zero_bit+0xe3/0x110 [ 883.132821] ? trace_hardirqs_off+0x10/0x10 [ 883.137142] ? __lock_is_held+0xb6/0x140 [ 883.141195] ? find_held_lock+0x35/0x1d0 [ 883.145255] ? __lock_is_held+0xb6/0x140 [ 883.149315] ? check_same_owner+0x320/0x320 [ 883.153624] ? rcu_note_context_switch+0x710/0x710 [ 883.158539] ? rcu_note_context_switch+0x710/0x710 [ 883.163447] should_failslab+0xec/0x120 [ 883.167410] __kmalloc+0x63/0x760 [ 883.170854] ? lockdep_init_map+0x9/0x10 [ 883.174892] ? debug_mutex_init+0x2d/0x60 [ 883.179022] ? __list_lru_init+0xcf/0x750 [ 883.183205] __list_lru_init+0xcf/0x750 [ 883.187160] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 883.193034] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 883.198035] ? __lockdep_init_map+0xe4/0x650 [ 883.202423] ? lockdep_init_map+0x9/0x10 [ 883.206461] sget_userns+0x691/0xe40 [ 883.210149] ? set_anon_super+0x20/0x20 [ 883.214100] ? put_filp+0x90/0x90 [ 883.217529] ? destroy_unused_super.part.6+0xd0/0xd0 [ 883.222623] ? alloc_vfsmnt+0x762/0x9c0 [ 883.226578] ? path_lookupat+0x238/0xba0 [ 883.230620] ? mnt_free_id.isra.21+0x50/0x50 [ 883.235006] ? trace_hardirqs_off+0x10/0x10 [ 883.239309] ? putname+0xee/0x130 [ 883.242738] ? cap_capable+0x1b5/0x230 [ 883.246624] ? security_capable+0x8e/0xc0 [ 883.250756] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 883.255921] ? ns_capable_common+0xcf/0x160 [ 883.260218] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 883.265391] mount_ns+0x6d/0x190 [ 883.268754] rpc_mount+0x9e/0xd0 [ 883.272113] mount_fs+0x66/0x2d0 [ 883.275462] vfs_kern_mount.part.26+0xc6/0x4a0 [ 883.280027] ? may_umount+0xa0/0xa0 [ 883.283638] ? _raw_read_unlock+0x22/0x30 [ 883.287780] ? __get_fs_type+0x8a/0xc0 [ 883.291645] do_mount+0xea4/0x2bb0 [ 883.295168] ? __might_fault+0x110/0x1d0 [ 883.299211] ? copy_mount_string+0x40/0x40 [ 883.303428] ? check_same_owner+0x320/0x320 [ 883.307733] ? __check_object_size+0x8b/0x530 [ 883.312213] ? __might_sleep+0x95/0x190 [ 883.316175] ? kasan_check_write+0x14/0x20 [ 883.320392] ? _copy_from_user+0x99/0x110 [ 883.324529] ? memdup_user+0x5e/0x90 [ 883.328226] ? copy_mount_options+0x1f7/0x2e0 [ 883.332709] SyS_mount+0xab/0x120 [ 883.336140] ? copy_mnt_ns+0xb30/0xb30 [ 883.340004] do_syscall_64+0x281/0x940 [ 883.343873] ? vmalloc_sync_all+0x30/0x30 [ 883.347993] ? _raw_spin_unlock_irq+0x27/0x70 [ 883.352469] ? finish_task_switch+0x1c1/0x7e0 [ 883.356939] ? syscall_return_slowpath+0x550/0x550 [ 883.361849] ? syscall_return_slowpath+0x2ac/0x550 [ 883.366764] ? prepare_exit_to_usermode+0x350/0x350 [ 883.371758] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 883.377098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 883.381925] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 883.387093] RIP: 0033:0x454e79 [ 883.390262] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 883.397953] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 883.405205] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 883.412462] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 883.419713] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 883.426957] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 2018/03/30 19:01:32 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 883.456406] FAULT_INJECTION: forcing a failure. [ 883.456406] name failslab, interval 1, probability 0, space 0, times 0 [ 883.467738] CPU: 1 PID: 26487 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 883.475010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.484361] Call Trace: [ 883.486939] dump_stack+0x194/0x24d [ 883.490550] ? arch_local_irq_restore+0x53/0x53 [ 883.495207] ? find_held_lock+0x35/0x1d0 [ 883.499260] should_fail+0x8c0/0xa40 [ 883.502967] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 883.508064] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 883.513247] ? find_held_lock+0x35/0x1d0 [ 883.517300] ? check_same_owner+0x320/0x320 [ 883.521603] ? rcu_note_context_switch+0x710/0x710 [ 883.526519] ? save_stack+0xa3/0xd0 [ 883.530134] should_failslab+0xec/0x120 [ 883.534100] kmem_cache_alloc+0x47/0x760 [ 883.538162] ? map_files_get_link+0x3a0/0x3a0 [ 883.542660] getname_flags+0xcb/0x580 [ 883.546460] user_path_at_empty+0x2d/0x50 [ 883.550610] do_mount+0x15f/0x2bb0 [ 883.554152] ? __might_fault+0x110/0x1d0 [ 883.558208] ? lock_downgrade+0x980/0x980 [ 883.562350] ? copy_mount_string+0x40/0x40 [ 883.566571] ? check_same_owner+0x320/0x320 [ 883.570873] ? __check_object_size+0x8b/0x530 [ 883.575345] ? __might_sleep+0x95/0x190 [ 883.579304] ? kasan_check_write+0x14/0x20 [ 883.583520] ? _copy_from_user+0x99/0x110 [ 883.587654] ? memdup_user+0x5e/0x90 [ 883.591347] ? copy_mount_options+0x1f7/0x2e0 [ 883.595833] SyS_mount+0xab/0x120 [ 883.599278] ? copy_mnt_ns+0xb30/0xb30 [ 883.603149] do_syscall_64+0x281/0x940 [ 883.607019] ? vmalloc_sync_all+0x30/0x30 [ 883.611156] ? _raw_spin_unlock_irq+0x27/0x70 [ 883.615635] ? finish_task_switch+0x1c1/0x7e0 [ 883.620124] ? syscall_return_slowpath+0x550/0x550 [ 883.625043] ? syscall_return_slowpath+0x2ac/0x550 [ 883.629958] ? prepare_exit_to_usermode+0x350/0x350 [ 883.634959] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 883.640304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 883.645226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 883.650401] RIP: 0033:0x454e79 2018/03/30 19:01:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:32 executing program 3 (fault-call:17 fault-nth:3): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 883.653569] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 883.661260] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 883.668511] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 883.675756] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 883.683000] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 883.690250] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/30 19:01:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:33 executing program 7 (fault-call:15 fault-nth:8): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) r1 = perf_event_open(&(0x7f0000000040)={0x6, 0x70, 0x1d3b, 0x64, 0x8, 0x8a, 0x0, 0x100000001, 0x100, 0x0, 0x7fffffff, 0x5, 0x7ff, 0x7fff, 0x5, 0xe6, 0x3, 0x0, 0x5, 0x70c3, 0x1000, 0xf0b, 0x7e000000000000, 0x1, 0x9, 0x74bd, 0xffff, 0x1, 0xa1, 0x7fffffff, 0xcd6, 0x0, 0x6, 0x1, 0x65, 0xffffffffffff7fff, 0x98f, 0xffffffff, 0x0, 0x3, 0x4, @perf_bp, 0x802, 0x55, 0x87, 0x6, 0xffffffffffffffa2, 0x4, 0x34b}, 0x0, 0x6, 0xffffffffffffff9c, 0xa) r2 = perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x2, 0x3, 0xfff, 0x3, 0x0, 0x6, 0xc000, 0x0, 0x4, 0x3, 0x5, 0x8, 0x3, 0x3, 0x8, 0x0, 0x3, 0x80, 0x3, 0x9, 0x7ff, 0x98, 0xfffffffeffffffff, 0x10000, 0x10001, 0x40, 0x1, 0x1, 0x3, 0x2, 0x100000001, 0x7f, 0x100000001, 0x5, 0x8, 0x2, 0x0, 0x1, 0x4, @perf_config_ext={0x7, 0x3}, 0x2, 0x1, 0x80000000, 0x0, 0x8, 0x1888000000000000, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000340)) 2018/03/30 19:01:33 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 883.794869] FAULT_INJECTION: forcing a failure. [ 883.794869] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 883.806711] CPU: 1 PID: 26501 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 883.813985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 883.820652] FAULT_INJECTION: forcing a failure. [ 883.820652] name failslab, interval 1, probability 0, space 0, times 0 [ 883.823329] Call Trace: [ 883.823350] dump_stack+0x194/0x24d [ 883.823366] ? arch_local_irq_restore+0x53/0x53 [ 883.823385] should_fail+0x8c0/0xa40 [ 883.823404] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 883.854163] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 883.859339] ? __lock_acquire+0x664/0x3e00 [ 883.863555] ? mntput_no_expire+0x130/0xa90 [ 883.867868] ? print_irqtrace_events+0x270/0x270 [ 883.872609] ? trace_hardirqs_off+0x10/0x10 [ 883.876915] ? print_irqtrace_events+0x270/0x270 [ 883.881657] ? lock_acquire+0x1d5/0x580 [ 883.885621] ? find_held_lock+0x35/0x1d0 [ 883.889665] ? __lock_acquire+0x664/0x3e00 [ 883.893883] ? should_fail+0x23b/0xa40 [ 883.897761] __alloc_pages_nodemask+0x327/0xdd0 [ 883.902420] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 883.907422] ? find_held_lock+0x35/0x1d0 [ 883.911474] ? check_same_owner+0x320/0x320 [ 883.915782] cache_grow_begin+0x72/0x640 [ 883.919827] kmem_cache_alloc+0x400/0x760 [ 883.923962] ? map_files_get_link+0x3a0/0x3a0 [ 883.928455] getname_flags+0xcb/0x580 [ 883.932241] user_path_at_empty+0x2d/0x50 [ 883.936372] do_mount+0x15f/0x2bb0 [ 883.939894] ? __might_fault+0x110/0x1d0 [ 883.943938] ? lock_downgrade+0x980/0x980 [ 883.948071] ? copy_mount_string+0x40/0x40 [ 883.952285] ? check_same_owner+0x320/0x320 [ 883.956591] ? __check_object_size+0x8b/0x530 [ 883.961071] ? __might_sleep+0x95/0x190 [ 883.965031] ? kasan_check_write+0x14/0x20 [ 883.969250] ? _copy_from_user+0x99/0x110 [ 883.973385] ? memdup_user+0x5e/0x90 [ 883.977082] ? copy_mount_options+0x1f7/0x2e0 [ 883.981562] SyS_mount+0xab/0x120 [ 883.985004] ? copy_mnt_ns+0xb30/0xb30 [ 883.988875] do_syscall_64+0x281/0x940 [ 883.992746] ? vmalloc_sync_all+0x30/0x30 [ 883.996876] ? _raw_spin_unlock_irq+0x27/0x70 [ 884.001355] ? finish_task_switch+0x1c1/0x7e0 [ 884.005837] ? syscall_return_slowpath+0x550/0x550 [ 884.010751] ? syscall_return_slowpath+0x2ac/0x550 [ 884.015663] ? prepare_exit_to_usermode+0x350/0x350 [ 884.020659] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 884.026006] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 884.030835] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 884.036008] RIP: 0033:0x454e79 [ 884.039180] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 884.046872] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 884.054125] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 884.061377] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 884.068628] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 884.075883] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 884.083152] CPU: 0 PID: 26511 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 2018/03/30 19:01:33 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r2, 0x28, &(0x7f0000000200)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000540)={r3, 0x2, 0x8}, 0xc) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x3, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 884.090421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.099772] Call Trace: [ 884.102359] dump_stack+0x194/0x24d [ 884.105993] ? arch_local_irq_restore+0x53/0x53 [ 884.110660] ? kernel_text_address+0xd1/0xe0 [ 884.115069] ? __unwind_start+0x169/0x330 [ 884.119219] should_fail+0x8c0/0xa40 [ 884.122928] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 884.128031] ? save_stack+0x43/0xd0 [ 884.131650] ? kasan_kmalloc+0xad/0xe0 [ 884.135526] ? __kmalloc+0x162/0x760 [ 884.139230] ? __list_lru_init+0xcf/0x750 [ 884.143374] ? find_held_lock+0x35/0x1d0 [ 884.147430] ? __lock_is_held+0xb6/0x140 [ 884.151488] ? check_same_owner+0x320/0x320 [ 884.155789] ? rcu_note_context_switch+0x710/0x710 [ 884.160705] should_failslab+0xec/0x120 [ 884.164661] kmem_cache_alloc_node_trace+0x5a/0x760 [ 884.169807] ? mark_held_locks+0xaf/0x100 [ 884.173939] ? __raw_spin_lock_init+0x1c/0x100 [ 884.178514] __kmalloc_node+0x33/0x70 [ 884.182302] kvmalloc_node+0x99/0xd0 [ 884.185991] __list_lru_init+0x5d5/0x750 [ 884.190043] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 884.195920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 884.200921] ? __lockdep_init_map+0xe4/0x650 [ 884.205322] ? lockdep_init_map+0x9/0x10 [ 884.209378] sget_userns+0x691/0xe40 [ 884.213102] ? set_anon_super+0x20/0x20 [ 884.217073] ? put_filp+0x90/0x90 [ 884.220507] ? destroy_unused_super.part.6+0xd0/0xd0 [ 884.225591] ? alloc_vfsmnt+0x762/0x9c0 [ 884.229573] ? path_lookupat+0x238/0xba0 [ 884.233624] ? mnt_free_id.isra.21+0x50/0x50 [ 884.238018] ? trace_hardirqs_off+0x10/0x10 [ 884.242330] ? putname+0xee/0x130 [ 884.245770] ? cap_capable+0x1b5/0x230 [ 884.249644] ? security_capable+0x8e/0xc0 [ 884.253783] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 884.258966] ? ns_capable_common+0xcf/0x160 [ 884.263275] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 884.268448] mount_ns+0x6d/0x190 [ 884.271796] rpc_mount+0x9e/0xd0 [ 884.275137] mount_fs+0x66/0x2d0 [ 884.278478] vfs_kern_mount.part.26+0xc6/0x4a0 [ 884.283039] ? may_umount+0xa0/0xa0 [ 884.286658] ? _raw_read_unlock+0x22/0x30 [ 884.290788] ? __get_fs_type+0x8a/0xc0 [ 884.294663] do_mount+0xea4/0x2bb0 [ 884.298190] ? __might_fault+0x110/0x1d0 [ 884.302234] ? copy_mount_string+0x40/0x40 [ 884.306452] ? check_same_owner+0x320/0x320 [ 884.310763] ? __check_object_size+0x8b/0x530 [ 884.315244] ? __might_sleep+0x95/0x190 [ 884.319204] ? kasan_check_write+0x14/0x20 [ 884.323422] ? _copy_from_user+0x99/0x110 [ 884.327551] ? memdup_user+0x5e/0x90 [ 884.331239] ? copy_mount_options+0x1f7/0x2e0 [ 884.335711] SyS_mount+0xab/0x120 [ 884.339150] ? copy_mnt_ns+0xb30/0xb30 [ 884.343023] do_syscall_64+0x281/0x940 [ 884.346892] ? vmalloc_sync_all+0x30/0x30 [ 884.351019] ? _raw_spin_unlock_irq+0x27/0x70 [ 884.355497] ? finish_task_switch+0x1c1/0x7e0 [ 884.359969] ? syscall_return_slowpath+0x550/0x550 [ 884.364872] ? syscall_return_slowpath+0x2ac/0x550 [ 884.369778] ? prepare_exit_to_usermode+0x350/0x350 [ 884.374769] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 884.380114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 884.384944] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 884.390119] RIP: 0033:0x454e79 [ 884.393295] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 884.400986] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 884.408232] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 884.415475] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 884.422724] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 884.429980] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 2018/03/30 19:01:33 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)={&(0x7f0000000200)='./file0/file0\x00', r2}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000500)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(r3) 2018/03/30 19:01:33 executing program 3 (fault-call:17 fault-nth:4): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:33 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x5d, 0xffffffffffffffff, 0x100000000, 0x1, 0xfffffffffffffffd}, 0x2d5) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f0000000340)="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") mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000001380)='./file0\x00', &(0x7f0000001340)='proc\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) socketpair(0x10, 0x1, 0x4, &(0x7f0000000040)) mount(&(0x7f0000000000)='./file0/bus\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x2000, &(0x7f00000002c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x8}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:33 executing program 7 (fault-call:15 fault-nth:9): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:33 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 884.631441] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 884.634457] FAULT_INJECTION: forcing a failure. [ 884.634457] name failslab, interval 1, probability 0, space 0, times 0 [ 884.647435] hugetlbfs: Bad mount option: "£Î ooPŸ¯2p‹I¸úbs%[ð4¡5ZMØ~éÚ·vTxEÆp Úõ\![ÆWÔ½ÎÙ™S9ÉelT¶Dûè²Uv3¹$òëK" [ 884.653624] CPU: 0 PID: 26546 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 884.653631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 884.653636] Call Trace: [ 884.653660] dump_stack+0x194/0x24d [ 884.688519] ? arch_local_irq_restore+0x53/0x53 [ 884.693169] should_fail+0x8c0/0xa40 [ 884.696856] ? is_bpf_text_address+0xa4/0x120 [ 884.701324] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 884.706402] ? __kernel_text_address+0xd/0x40 [ 884.710874] ? unwind_get_return_address+0x61/0xa0 [ 884.715784] ? find_held_lock+0x35/0x1d0 [ 884.719822] ? __lock_is_held+0xb6/0x140 [ 884.723862] ? check_same_owner+0x320/0x320 [ 884.728158] ? rcu_note_context_switch+0x710/0x710 [ 884.733070] should_failslab+0xec/0x120 [ 884.737026] kmem_cache_alloc_trace+0x4b/0x740 [ 884.741582] ? __kmalloc_node+0x33/0x70 [ 884.745529] ? __kmalloc_node+0x33/0x70 [ 884.749477] ? rcu_read_lock_sched_held+0x108/0x120 [ 884.754471] __memcg_init_list_lru_node+0x169/0x270 [ 884.759464] ? list_lru_add+0x7c0/0x7c0 [ 884.763410] ? __kmalloc_node+0x47/0x70 [ 884.767363] __list_lru_init+0x544/0x750 [ 884.771400] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 884.777261] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 884.782250] ? __lockdep_init_map+0xe4/0x650 [ 884.786632] ? lockdep_init_map+0x9/0x10 [ 884.790668] sget_userns+0x691/0xe40 [ 884.794356] ? set_anon_super+0x20/0x20 [ 884.798305] ? put_filp+0x90/0x90 [ 884.801734] ? destroy_unused_super.part.6+0xd0/0xd0 [ 884.806811] ? alloc_vfsmnt+0x762/0x9c0 [ 884.810759] ? path_lookupat+0x238/0xba0 [ 884.814796] ? mnt_free_id.isra.21+0x50/0x50 [ 884.819179] ? trace_hardirqs_off+0x10/0x10 [ 884.823476] ? putname+0xee/0x130 [ 884.826904] ? cap_capable+0x1b5/0x230 [ 884.830767] ? security_capable+0x8e/0xc0 [ 884.834890] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 884.840056] ? ns_capable_common+0xcf/0x160 [ 884.844352] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 884.850058] mount_ns+0x6d/0x190 [ 884.853402] rpc_mount+0x9e/0xd0 [ 884.856744] mount_fs+0x66/0x2d0 [ 884.860085] vfs_kern_mount.part.26+0xc6/0x4a0 [ 884.864641] ? may_umount+0xa0/0xa0 [ 884.868246] ? _raw_read_unlock+0x22/0x30 [ 884.872367] ? __get_fs_type+0x8a/0xc0 [ 884.876232] do_mount+0xea4/0x2bb0 [ 884.879746] ? __might_fault+0x110/0x1d0 [ 884.883785] ? copy_mount_string+0x40/0x40 [ 884.887996] ? check_same_owner+0x320/0x320 [ 884.892294] ? __check_object_size+0x8b/0x530 [ 884.896763] ? __might_sleep+0x95/0x190 [ 884.900715] ? kasan_check_write+0x14/0x20 [ 884.904925] ? _copy_from_user+0x99/0x110 [ 884.909050] ? memdup_user+0x5e/0x90 [ 884.912735] ? copy_mount_options+0x1f7/0x2e0 [ 884.917204] SyS_mount+0xab/0x120 [ 884.920633] ? copy_mnt_ns+0xb30/0xb30 [ 884.924495] do_syscall_64+0x281/0x940 [ 884.928356] ? vmalloc_sync_all+0x30/0x30 [ 884.932479] ? _raw_spin_unlock_irq+0x27/0x70 [ 884.936950] ? finish_task_switch+0x1c1/0x7e0 [ 884.941421] ? syscall_return_slowpath+0x550/0x550 [ 884.946324] ? syscall_return_slowpath+0x2ac/0x550 [ 884.951226] ? prepare_exit_to_usermode+0x350/0x350 [ 884.956218] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 884.961558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 884.966379] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 884.971542] RIP: 0033:0x454e79 [ 884.974705] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 884.982386] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 884.989631] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 884.996873] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 885.004118] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 885.011362] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 885.026891] FAULT_INJECTION: forcing a failure. 2018/03/30 19:01:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) r1 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x800) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) [ 885.026891] name failslab, interval 1, probability 0, space 0, times 0 [ 885.038159] CPU: 1 PID: 26541 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 885.045422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.054753] Call Trace: [ 885.057322] dump_stack+0x194/0x24d [ 885.060939] ? arch_local_irq_restore+0x53/0x53 [ 885.065605] ? lock_downgrade+0x980/0x980 [ 885.069743] should_fail+0x8c0/0xa40 [ 885.073442] ? trace_hardirqs_off+0x10/0x10 [ 885.077759] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 885.082853] ? is_bpf_text_address+0xa4/0x120 [ 885.087327] ? find_held_lock+0x35/0x1d0 [ 885.091374] ? check_same_owner+0x320/0x320 [ 885.095677] ? putname+0xee/0x130 [ 885.099111] ? filename_lookup+0x315/0x500 [ 885.103325] ? user_path_at_empty+0x40/0x50 [ 885.107635] ? rcu_note_context_switch+0x710/0x710 [ 885.112556] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 885.117897] should_failslab+0xec/0x120 [ 885.121861] kmem_cache_alloc+0x47/0x760 [ 885.125911] ? free_obj_work+0x690/0x690 [ 885.129952] alloc_vfsmnt+0xe0/0x9c0 [ 885.133664] ? path_lookupat+0x238/0xba0 [ 885.137706] ? mnt_free_id.isra.21+0x50/0x50 [ 885.142095] ? trace_hardirqs_off+0x10/0x10 [ 885.146396] ? putname+0xee/0x130 [ 885.149826] ? putname+0xee/0x130 [ 885.153257] ? rcu_read_lock_sched_held+0x108/0x120 [ 885.158261] ? find_held_lock+0x35/0x1d0 [ 885.162318] ? __get_fs_type+0x8a/0xc0 [ 885.166193] ? lock_downgrade+0x980/0x980 [ 885.170320] ? module_unload_free+0x5b0/0x5b0 [ 885.174793] ? lock_release+0xa40/0xa40 [ 885.178746] ? mpi_resize+0x200/0x200 [ 885.182525] vfs_kern_mount.part.26+0x84/0x4a0 [ 885.187086] ? may_umount+0xa0/0xa0 [ 885.190692] ? _raw_read_unlock+0x22/0x30 [ 885.194815] ? __get_fs_type+0x8a/0xc0 [ 885.198687] do_mount+0xea4/0x2bb0 [ 885.202210] ? __might_fault+0x110/0x1d0 [ 885.206251] ? copy_mount_string+0x40/0x40 [ 885.210470] ? check_same_owner+0x320/0x320 [ 885.214781] ? __check_object_size+0x8b/0x530 [ 885.219251] ? __might_sleep+0x95/0x190 [ 885.223205] ? kasan_check_write+0x14/0x20 [ 885.227420] ? _copy_from_user+0x99/0x110 [ 885.231560] ? memdup_user+0x5e/0x90 [ 885.235257] ? copy_mount_options+0x1f7/0x2e0 [ 885.239729] SyS_mount+0xab/0x120 [ 885.243157] ? copy_mnt_ns+0xb30/0xb30 [ 885.247031] do_syscall_64+0x281/0x940 [ 885.250902] ? vmalloc_sync_all+0x30/0x30 [ 885.255030] ? _raw_spin_unlock_irq+0x27/0x70 [ 885.259510] ? finish_task_switch+0x1c1/0x7e0 [ 885.263982] ? syscall_return_slowpath+0x550/0x550 [ 885.268886] ? syscall_return_slowpath+0x2ac/0x550 [ 885.273789] ? prepare_exit_to_usermode+0x350/0x350 [ 885.278781] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 885.284124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 885.288949] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 885.294114] RIP: 0033:0x454e79 [ 885.297277] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 885.304960] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 885.312203] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 885.319450] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 885.326693] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 19:01:34 executing program 7 (fault-call:15 fault-nth:10): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 885.333949] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/30 19:01:34 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 885.413545] FAULT_INJECTION: forcing a failure. [ 885.413545] name failslab, interval 1, probability 0, space 0, times 0 [ 885.424837] CPU: 0 PID: 26555 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 885.432111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.441461] Call Trace: [ 885.444057] dump_stack+0x194/0x24d [ 885.447690] ? arch_local_irq_restore+0x53/0x53 [ 885.452358] ? __save_stack_trace+0x7e/0xd0 [ 885.456687] should_fail+0x8c0/0xa40 2018/03/30 19:01:34 executing program 3 (fault-call:17 fault-nth:5): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 885.460407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 885.465509] ? kasan_kmalloc+0xad/0xe0 [ 885.469397] ? kmem_cache_alloc_trace+0x136/0x740 [ 885.474241] ? __memcg_init_list_lru_node+0x169/0x270 [ 885.479433] ? __list_lru_init+0x544/0x750 [ 885.483658] ? sget_userns+0x691/0xe40 [ 885.487527] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 885.492261] ? do_mount+0xea4/0x2bb0 [ 885.495961] ? SyS_mount+0xab/0x120 [ 885.499574] ? do_syscall_64+0x281/0x940 [ 885.503615] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 885.508962] ? find_held_lock+0x35/0x1d0 [ 885.513011] ? __lock_is_held+0xb6/0x140 [ 885.517077] ? check_same_owner+0x320/0x320 [ 885.521388] ? rcu_note_context_switch+0x710/0x710 [ 885.526298] should_failslab+0xec/0x120 [ 885.530255] kmem_cache_alloc_trace+0x4b/0x740 [ 885.534826] ? __kmalloc_node+0x33/0x70 [ 885.538784] ? __kmalloc_node+0x33/0x70 [ 885.542735] ? rcu_read_lock_sched_held+0x108/0x120 [ 885.547729] __memcg_init_list_lru_node+0x169/0x270 [ 885.552725] ? list_lru_add+0x7c0/0x7c0 [ 885.556689] ? __kmalloc_node+0x47/0x70 [ 885.560661] __list_lru_init+0x544/0x750 [ 885.564711] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 885.570575] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 885.575567] ? __lockdep_init_map+0xe4/0x650 [ 885.579952] ? lockdep_init_map+0x9/0x10 [ 885.583988] sget_userns+0x691/0xe40 [ 885.587676] ? set_anon_super+0x20/0x20 [ 885.591625] ? put_filp+0x90/0x90 [ 885.595061] ? destroy_unused_super.part.6+0xd0/0xd0 [ 885.600146] ? alloc_vfsmnt+0x762/0x9c0 [ 885.604093] ? path_lookupat+0x238/0xba0 [ 885.608128] ? mnt_free_id.isra.21+0x50/0x50 [ 885.612511] ? trace_hardirqs_off+0x10/0x10 [ 885.616808] ? putname+0xee/0x130 [ 885.620250] ? cap_capable+0x1b5/0x230 [ 885.624120] ? security_capable+0x8e/0xc0 [ 885.628255] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 885.633437] ? ns_capable_common+0xcf/0x160 [ 885.637744] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 885.642905] mount_ns+0x6d/0x190 [ 885.646257] rpc_mount+0x9e/0xd0 [ 885.649598] mount_fs+0x66/0x2d0 [ 885.652940] vfs_kern_mount.part.26+0xc6/0x4a0 [ 885.657497] ? may_umount+0xa0/0xa0 [ 885.661100] ? _raw_read_unlock+0x22/0x30 [ 885.665230] ? __get_fs_type+0x8a/0xc0 [ 885.669095] do_mount+0xea4/0x2bb0 [ 885.672609] ? __might_fault+0x110/0x1d0 [ 885.676647] ? copy_mount_string+0x40/0x40 [ 885.680867] ? check_same_owner+0x320/0x320 [ 885.685171] ? __check_object_size+0x8b/0x530 [ 885.689641] ? __might_sleep+0x95/0x190 [ 885.693592] ? kasan_check_write+0x14/0x20 [ 885.697801] ? _copy_from_user+0x99/0x110 [ 885.701935] ? memdup_user+0x5e/0x90 [ 885.705634] ? copy_mount_options+0x1f7/0x2e0 [ 885.710107] SyS_mount+0xab/0x120 [ 885.713541] ? copy_mnt_ns+0xb30/0xb30 [ 885.717402] do_syscall_64+0x281/0x940 [ 885.721262] ? vmalloc_sync_all+0x30/0x30 [ 885.725387] ? _raw_spin_unlock_irq+0x27/0x70 [ 885.729876] ? finish_task_switch+0x1c1/0x7e0 [ 885.734345] ? syscall_return_slowpath+0x550/0x550 [ 885.739257] ? syscall_return_slowpath+0x2ac/0x550 [ 885.744189] ? prepare_exit_to_usermode+0x350/0x350 [ 885.749182] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 885.754526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 885.759355] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 885.764521] RIP: 0033:0x454e79 [ 885.767681] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 885.775363] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 885.782605] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 885.789852] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 885.797103] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 885.804348] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/30 19:01:35 executing program 7 (fault-call:15 fault-nth:11): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 885.860355] FAULT_INJECTION: forcing a failure. [ 885.860355] name failslab, interval 1, probability 0, space 0, times 0 [ 885.871652] CPU: 0 PID: 26565 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 885.878929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 885.888279] Call Trace: [ 885.890871] dump_stack+0x194/0x24d [ 885.894507] ? arch_local_irq_restore+0x53/0x53 [ 885.899185] ? __unwind_start+0x169/0x330 [ 885.903345] ? __kernel_text_address+0xd/0x40 2018/03/30 19:01:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000540)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000500)='./file0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 885.907851] should_fail+0x8c0/0xa40 [ 885.911569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 885.916674] ? save_stack+0xa3/0xd0 [ 885.920302] ? save_stack+0x43/0xd0 [ 885.923930] ? kasan_kmalloc+0xad/0xe0 [ 885.927820] ? kasan_slab_alloc+0x12/0x20 [ 885.931970] ? kmem_cache_alloc+0x12e/0x760 [ 885.936293] ? alloc_vfsmnt+0xe0/0x9c0 [ 885.940174] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 885.944914] ? do_mount+0xea4/0x2bb0 [ 885.948615] ? find_held_lock+0x35/0x1d0 [ 885.952678] ? check_same_owner+0x320/0x320 [ 885.956983] ? rcu_note_context_switch+0x710/0x710 [ 885.961893] should_failslab+0xec/0x120 [ 885.965847] __kmalloc_track_caller+0x5f/0x760 [ 885.970405] ? do_raw_spin_trylock+0x190/0x190 [ 885.974962] ? kstrdup_const+0x39/0x50 [ 885.978826] kstrdup+0x39/0x70 [ 885.981999] kstrdup_const+0x39/0x50 [ 885.985696] alloc_vfsmnt+0x1a5/0x9c0 [ 885.989474] ? path_lookupat+0x238/0xba0 [ 885.993513] ? mnt_free_id.isra.21+0x50/0x50 [ 885.997900] ? trace_hardirqs_off+0x10/0x10 [ 886.002197] ? putname+0xee/0x130 [ 886.005624] ? putname+0xee/0x130 [ 886.009051] ? rcu_read_lock_sched_held+0x108/0x120 [ 886.014043] ? find_held_lock+0x35/0x1d0 [ 886.018083] ? __get_fs_type+0x8a/0xc0 [ 886.021949] ? lock_downgrade+0x980/0x980 [ 886.026072] ? module_unload_free+0x5b0/0x5b0 [ 886.030543] ? lock_release+0xa40/0xa40 [ 886.034496] ? mpi_resize+0x200/0x200 [ 886.038274] vfs_kern_mount.part.26+0x84/0x4a0 [ 886.042833] ? may_umount+0xa0/0xa0 [ 886.046436] ? _raw_read_unlock+0x22/0x30 [ 886.050557] ? __get_fs_type+0x8a/0xc0 [ 886.054419] do_mount+0xea4/0x2bb0 [ 886.057933] ? __might_fault+0x110/0x1d0 [ 886.061970] ? copy_mount_string+0x40/0x40 [ 886.066180] ? check_same_owner+0x320/0x320 [ 886.070477] ? __check_object_size+0x8b/0x530 [ 886.074951] ? __might_sleep+0x95/0x190 [ 886.078905] ? kasan_check_write+0x14/0x20 [ 886.083116] ? _copy_from_user+0x99/0x110 [ 886.087242] ? memdup_user+0x5e/0x90 [ 886.090930] ? copy_mount_options+0x1f7/0x2e0 [ 886.095403] SyS_mount+0xab/0x120 [ 886.098831] ? copy_mnt_ns+0xb30/0xb30 [ 886.102693] do_syscall_64+0x281/0x940 [ 886.106555] ? vmalloc_sync_all+0x30/0x30 [ 886.110678] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 886.116188] ? syscall_return_slowpath+0x550/0x550 [ 886.121094] ? syscall_return_slowpath+0x2ac/0x550 [ 886.126002] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 886.131353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 886.136172] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 886.141335] RIP: 0033:0x454e79 [ 886.144499] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 886.152181] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 886.159427] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 886.166671] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 886.173914] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 886.181160] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 [ 886.248724] FAULT_INJECTION: forcing a failure. [ 886.248724] name failslab, interval 1, probability 0, space 0, times 0 [ 886.260062] CPU: 1 PID: 26584 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 886.267337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.276689] Call Trace: [ 886.279288] dump_stack+0x194/0x24d [ 886.282921] ? arch_local_irq_restore+0x53/0x53 [ 886.287588] ? __save_stack_trace+0x7e/0xd0 [ 886.291915] should_fail+0x8c0/0xa40 [ 886.295621] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 886.300706] ? kasan_kmalloc+0xad/0xe0 [ 886.304571] ? kmem_cache_alloc_trace+0x136/0x740 [ 886.309394] ? __memcg_init_list_lru_node+0x169/0x270 [ 886.314558] ? __list_lru_init+0x544/0x750 [ 886.318768] ? sget_userns+0x691/0xe40 [ 886.322632] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 886.327362] ? do_mount+0xea4/0x2bb0 [ 886.331056] ? SyS_mount+0xab/0x120 [ 886.334668] ? do_syscall_64+0x281/0x940 [ 886.338710] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 886.344061] ? find_held_lock+0x35/0x1d0 [ 886.348102] ? __lock_is_held+0xb6/0x140 [ 886.352159] ? check_same_owner+0x320/0x320 [ 886.356477] ? rcu_note_context_switch+0x710/0x710 [ 886.361394] should_failslab+0xec/0x120 [ 886.365345] kmem_cache_alloc_trace+0x4b/0x740 [ 886.369900] ? __kmalloc_node+0x33/0x70 [ 886.373851] ? __kmalloc_node+0x33/0x70 [ 886.377799] ? rcu_read_lock_sched_held+0x108/0x120 [ 886.382794] __memcg_init_list_lru_node+0x169/0x270 [ 886.387791] ? list_lru_add+0x7c0/0x7c0 [ 886.391742] ? __kmalloc_node+0x47/0x70 [ 886.395692] __list_lru_init+0x544/0x750 [ 886.399734] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 886.405602] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 886.410633] ? __lockdep_init_map+0xe4/0x650 [ 886.415019] ? lockdep_init_map+0x9/0x10 [ 886.419057] sget_userns+0x691/0xe40 [ 886.422745] ? set_anon_super+0x20/0x20 [ 886.426696] ? put_filp+0x90/0x90 [ 886.430131] ? destroy_unused_super.part.6+0xd0/0xd0 [ 886.435207] ? alloc_vfsmnt+0x762/0x9c0 [ 886.439154] ? path_lookupat+0x238/0xba0 [ 886.443186] ? mnt_free_id.isra.21+0x50/0x50 [ 886.447569] ? trace_hardirqs_off+0x10/0x10 [ 886.451865] ? putname+0xee/0x130 [ 886.455293] ? cap_capable+0x1b5/0x230 [ 886.459167] ? security_capable+0x8e/0xc0 [ 886.463298] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 886.468458] ? ns_capable_common+0xcf/0x160 [ 886.472754] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 886.477913] mount_ns+0x6d/0x190 [ 886.481254] rpc_mount+0x9e/0xd0 [ 886.484594] mount_fs+0x66/0x2d0 [ 886.487932] vfs_kern_mount.part.26+0xc6/0x4a0 [ 886.492486] ? may_umount+0xa0/0xa0 [ 886.496088] ? _raw_read_unlock+0x22/0x30 [ 886.500212] ? __get_fs_type+0x8a/0xc0 [ 886.504077] do_mount+0xea4/0x2bb0 [ 886.507588] ? __might_fault+0x110/0x1d0 [ 886.511627] ? copy_mount_string+0x40/0x40 [ 886.515835] ? check_same_owner+0x320/0x320 [ 886.520131] ? __check_object_size+0x8b/0x530 [ 886.524609] ? __might_sleep+0x95/0x190 [ 886.528561] ? kasan_check_write+0x14/0x20 [ 886.532772] ? _copy_from_user+0x99/0x110 [ 886.536896] ? memdup_user+0x5e/0x90 [ 886.540580] ? copy_mount_options+0x1f7/0x2e0 [ 886.545055] SyS_mount+0xab/0x120 [ 886.548480] ? copy_mnt_ns+0xb30/0xb30 [ 886.552344] do_syscall_64+0x281/0x940 [ 886.556203] ? vmalloc_sync_all+0x30/0x30 [ 886.560322] ? _raw_spin_unlock_irq+0x27/0x70 [ 886.564790] ? finish_task_switch+0x1c1/0x7e0 [ 886.569261] ? syscall_return_slowpath+0x550/0x550 [ 886.574163] ? syscall_return_slowpath+0x2ac/0x550 [ 886.579068] ? prepare_exit_to_usermode+0x350/0x350 [ 886.584059] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 886.589402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 886.594221] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 886.599382] RIP: 0033:0x454e79 [ 886.602543] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 886.610231] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 886.617476] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 886.624731] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 886.631974] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 886.639218] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/30 19:01:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000100)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xcd, 0x1000, &(0x7f0000000000)="8dd94f6f916816e2fcbda630ac980b3e1751c6b8364cd278429a8058f61175f5c21c6b4f9001314c888de7b28761911b414823e028b765e10ae559b0cf2131c9f48f3adb64602326cfdd5420ba691b07dd1b6109f743afb7727bbf5ddbda0c472d306fdf646b9e606301d684cc34736b6a9814ded88895a41b7a73f510c2ec2f9efbf1e0c1854e0b3bf5e8298dff4b4dbeb6349df52342ebd4806218acfa1cb3c4581680e6c459508f5b0cce0da9ad1d5bef4cff9efbc1f7bd37ee60bdc28abdece217170ff864d8201c97650a", &(0x7f0000001680)=""/4096, 0x7f, 0x200000000000003}, 0x28) 2018/03/30 19:01:35 executing program 3 (fault-call:17 fault-nth:6): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) recvmsg$kcm(r3, &(0x7f0000002000)={&(0x7f0000000580)=@can, 0x80, &(0x7f0000001ec0)=[{&(0x7f00000009c0)=""/173, 0xad}, {&(0x7f0000000c00)=""/166, 0xa6}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/248, 0xf8}, {&(0x7f0000000300)=""/4, 0x4}, {&(0x7f0000000700)=""/86, 0x56}, {&(0x7f0000001dc0)}, {&(0x7f0000001e00)=""/132, 0x84}], 0x8, &(0x7f0000001f40)=""/163, 0xa3, 0x7fffffff}, 0x40002162) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000500)="24c43f000000086406946057747513d0000007cbadac1777abe5e18ab32ea8f13810df4d15ebb58931dc818071b54fa58e2622faafb707706b26efcdd46f0cfcb97ae7bd26ce2688830e6e098d4e28de06d2d9380000") socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001dc0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:35 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:35 executing program 7 (fault-call:15 fault-nth:12): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 886.764176] FAULT_INJECTION: forcing a failure. [ 886.764176] name failslab, interval 1, probability 0, space 0, times 0 [ 886.775571] CPU: 0 PID: 26599 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 886.782842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.792181] Call Trace: [ 886.794757] dump_stack+0x194/0x24d [ 886.798362] ? arch_local_irq_restore+0x53/0x53 [ 886.803011] ? __save_stack_trace+0x7e/0xd0 [ 886.807316] should_fail+0x8c0/0xa40 [ 886.811016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 886.816103] ? kasan_kmalloc+0xad/0xe0 [ 886.819967] ? kmem_cache_alloc_trace+0x136/0x740 [ 886.824784] ? __memcg_init_list_lru_node+0x169/0x270 [ 886.829949] ? __list_lru_init+0x544/0x750 [ 886.834159] ? sget_userns+0x691/0xe40 [ 886.838028] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 886.842761] ? do_mount+0xea4/0x2bb0 [ 886.846447] ? SyS_mount+0xab/0x120 [ 886.850555] ? do_syscall_64+0x281/0x940 [ 886.854593] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 886.859935] ? find_held_lock+0x35/0x1d0 [ 886.863982] ? __lock_is_held+0xb6/0x140 [ 886.868032] ? check_same_owner+0x320/0x320 [ 886.872332] ? rcu_note_context_switch+0x710/0x710 [ 886.877245] should_failslab+0xec/0x120 [ 886.881199] kmem_cache_alloc_trace+0x4b/0x740 [ 886.885758] ? __kmalloc_node+0x33/0x70 [ 886.889707] ? __kmalloc_node+0x33/0x70 [ 886.893658] ? rcu_read_lock_sched_held+0x108/0x120 [ 886.898652] __memcg_init_list_lru_node+0x169/0x270 [ 886.903644] ? list_lru_add+0x7c0/0x7c0 [ 886.907592] ? __kmalloc_node+0x47/0x70 [ 886.911544] __list_lru_init+0x544/0x750 [ 886.915581] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 886.921441] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 886.926432] ? __lockdep_init_map+0xe4/0x650 [ 886.930816] ? lockdep_init_map+0x9/0x10 [ 886.934852] sget_userns+0x691/0xe40 [ 886.938541] ? set_anon_super+0x20/0x20 [ 886.942491] ? put_filp+0x90/0x90 [ 886.945918] ? destroy_unused_super.part.6+0xd0/0xd0 [ 886.950999] ? alloc_vfsmnt+0x762/0x9c0 [ 886.954952] ? path_lookupat+0x238/0xba0 [ 886.958991] ? mnt_free_id.isra.21+0x50/0x50 [ 886.963379] ? trace_hardirqs_off+0x10/0x10 [ 886.967675] ? putname+0xee/0x130 [ 886.971108] ? cap_capable+0x1b5/0x230 [ 886.974972] ? security_capable+0x8e/0xc0 [ 886.979104] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 886.984272] ? ns_capable_common+0xcf/0x160 [ 886.988568] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 886.993731] mount_ns+0x6d/0x190 [ 886.997074] rpc_mount+0x9e/0xd0 [ 887.000414] mount_fs+0x66/0x2d0 [ 887.003763] vfs_kern_mount.part.26+0xc6/0x4a0 [ 887.008320] ? may_umount+0xa0/0xa0 [ 887.011920] ? _raw_read_unlock+0x22/0x30 [ 887.016045] ? __get_fs_type+0x8a/0xc0 [ 887.019907] do_mount+0xea4/0x2bb0 [ 887.023419] ? __might_fault+0x110/0x1d0 [ 887.027454] ? copy_mount_string+0x40/0x40 [ 887.031662] ? check_same_owner+0x320/0x320 [ 887.035959] ? __check_object_size+0x8b/0x530 [ 887.040432] ? __might_sleep+0x95/0x190 [ 887.044381] ? kasan_check_write+0x14/0x20 [ 887.048589] ? _copy_from_user+0x99/0x110 [ 887.052714] ? memdup_user+0x5e/0x90 [ 887.056402] ? copy_mount_options+0x1f7/0x2e0 [ 887.060872] SyS_mount+0xab/0x120 [ 887.064299] ? copy_mnt_ns+0xb30/0xb30 [ 887.068161] do_syscall_64+0x281/0x940 [ 887.072025] ? vmalloc_sync_all+0x30/0x30 [ 887.076148] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 887.081657] ? syscall_return_slowpath+0x550/0x550 [ 887.086560] ? syscall_return_slowpath+0x2ac/0x550 [ 887.091466] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 887.096805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.101623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.106786] RIP: 0033:0x454e79 [ 887.109949] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 887.117632] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 887.124875] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 887.132207] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 887.139452] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 887.146696] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/30 19:01:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 887.168851] FAULT_INJECTION: forcing a failure. [ 887.168851] name failslab, interval 1, probability 0, space 0, times 0 [ 887.180203] CPU: 0 PID: 26608 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 887.187477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.196821] Call Trace: [ 887.199391] dump_stack+0x194/0x24d [ 887.203004] ? arch_local_irq_restore+0x53/0x53 [ 887.207663] should_fail+0x8c0/0xa40 [ 887.211366] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 887.216453] ? find_next_zero_bit+0xe3/0x110 [ 887.220837] ? trace_hardirqs_off+0x10/0x10 [ 887.225152] ? __lock_is_held+0xb6/0x140 [ 887.229205] ? find_held_lock+0x35/0x1d0 [ 887.233249] ? __lock_is_held+0xb6/0x140 [ 887.237301] ? check_same_owner+0x320/0x320 [ 887.241622] ? rcu_note_context_switch+0x710/0x710 [ 887.246541] ? rcu_note_context_switch+0x710/0x710 [ 887.251462] should_failslab+0xec/0x120 [ 887.255426] __kmalloc+0x63/0x760 [ 887.258872] ? lockdep_init_map+0x9/0x10 [ 887.262915] ? debug_mutex_init+0x2d/0x60 [ 887.267043] ? __list_lru_init+0xcf/0x750 [ 887.271177] __list_lru_init+0xcf/0x750 [ 887.275135] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 887.281006] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 887.286010] ? __lockdep_init_map+0xe4/0x650 [ 887.290402] ? lockdep_init_map+0x9/0x10 [ 887.294443] sget_userns+0x691/0xe40 [ 887.298137] ? set_anon_super+0x20/0x20 [ 887.302108] ? put_filp+0x90/0x90 [ 887.305547] ? destroy_unused_super.part.6+0xd0/0xd0 [ 887.310628] ? alloc_vfsmnt+0x762/0x9c0 [ 887.314581] ? path_lookupat+0x238/0xba0 [ 887.318628] ? mnt_free_id.isra.21+0x50/0x50 [ 887.323024] ? trace_hardirqs_off+0x10/0x10 [ 887.327340] ? putname+0xee/0x130 [ 887.330784] ? cap_capable+0x1b5/0x230 [ 887.334651] ? security_capable+0x8e/0xc0 [ 887.338782] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 887.343954] ? ns_capable_common+0xcf/0x160 [ 887.348275] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 887.353443] mount_ns+0x6d/0x190 [ 887.356785] rpc_mount+0x9e/0xd0 [ 887.360127] mount_fs+0x66/0x2d0 [ 887.363483] vfs_kern_mount.part.26+0xc6/0x4a0 [ 887.368049] ? may_umount+0xa0/0xa0 [ 887.371654] ? _raw_read_unlock+0x22/0x30 [ 887.375775] ? __get_fs_type+0x8a/0xc0 [ 887.379640] do_mount+0xea4/0x2bb0 [ 887.383157] ? __might_fault+0x110/0x1d0 [ 887.387195] ? copy_mount_string+0x40/0x40 [ 887.391406] ? check_same_owner+0x320/0x320 [ 887.395713] ? __check_object_size+0x8b/0x530 [ 887.400200] ? __might_sleep+0x95/0x190 [ 887.404160] ? kasan_check_write+0x14/0x20 [ 887.408378] ? _copy_from_user+0x99/0x110 [ 887.412505] ? memdup_user+0x5e/0x90 [ 887.416198] ? copy_mount_options+0x1f7/0x2e0 [ 887.420674] SyS_mount+0xab/0x120 [ 887.424110] ? copy_mnt_ns+0xb30/0xb30 [ 887.427983] do_syscall_64+0x281/0x940 [ 887.431849] ? vmalloc_sync_all+0x30/0x30 [ 887.435983] ? _raw_spin_unlock_irq+0x27/0x70 [ 887.440457] ? finish_task_switch+0x1c1/0x7e0 [ 887.444924] ? syscall_return_slowpath+0x550/0x550 [ 887.449826] ? syscall_return_slowpath+0x2ac/0x550 [ 887.454731] ? prepare_exit_to_usermode+0x350/0x350 [ 887.459726] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 887.465077] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 887.469918] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.475094] RIP: 0033:0x454e79 [ 887.478267] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 887.485962] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 887.493221] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 887.500476] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 887.507735] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 19:01:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x800, 0x7ff, &(0x7f0000000000)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) [ 887.514986] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/30 19:01:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:36 executing program 7 (fault-call:15 fault-nth:13): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:36 executing program 3 (fault-call:17 fault-nth:7): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f0000000500)=@un=@abs={0x0, 0x0, 0x4e21}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000200), 0x1d4, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:36 executing program 1: socketpair(0x1, 0x3, 0x9, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4000005, 0x3, 0x4, 0x1, 0x0, r0, 0x3d}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r1, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) [ 887.687550] FAULT_INJECTION: forcing a failure. [ 887.687550] name failslab, interval 1, probability 0, space 0, times 0 [ 887.698853] CPU: 0 PID: 26638 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 887.702283] FAULT_INJECTION: forcing a failure. [ 887.702283] name failslab, interval 1, probability 0, space 0, times 0 [ 887.706117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 887.706122] Call Trace: [ 887.706141] dump_stack+0x194/0x24d [ 887.706155] ? arch_local_irq_restore+0x53/0x53 [ 887.706168] ? __save_stack_trace+0x7e/0xd0 [ 887.706186] should_fail+0x8c0/0xa40 [ 887.745481] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 887.750570] ? kasan_kmalloc+0xad/0xe0 [ 887.754438] ? kmem_cache_alloc_trace+0x136/0x740 [ 887.759264] ? __memcg_init_list_lru_node+0x169/0x270 [ 887.764438] ? __list_lru_init+0x544/0x750 [ 887.768654] ? sget_userns+0x691/0xe40 [ 887.772522] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 887.777258] ? do_mount+0xea4/0x2bb0 [ 887.780951] ? SyS_mount+0xab/0x120 [ 887.784562] ? do_syscall_64+0x281/0x940 [ 887.788608] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 887.793957] ? find_held_lock+0x35/0x1d0 [ 887.798004] ? __lock_is_held+0xb6/0x140 [ 887.802057] ? check_same_owner+0x320/0x320 [ 887.806362] ? rcu_note_context_switch+0x710/0x710 [ 887.811276] should_failslab+0xec/0x120 [ 887.815231] kmem_cache_alloc_trace+0x4b/0x740 [ 887.819797] ? __kmalloc_node+0x33/0x70 [ 887.823752] ? __kmalloc_node+0x33/0x70 [ 887.828232] ? rcu_read_lock_sched_held+0x108/0x120 [ 887.833231] __memcg_init_list_lru_node+0x169/0x270 [ 887.838230] ? list_lru_add+0x7c0/0x7c0 [ 887.842188] ? __kmalloc_node+0x47/0x70 [ 887.846150] __list_lru_init+0x544/0x750 [ 887.850199] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 887.856066] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 887.861066] ? __lockdep_init_map+0xe4/0x650 [ 887.865460] ? lockdep_init_map+0x9/0x10 [ 887.869507] sget_userns+0x691/0xe40 [ 887.873203] ? set_anon_super+0x20/0x20 [ 887.877158] ? put_filp+0x90/0x90 [ 887.880594] ? destroy_unused_super.part.6+0xd0/0xd0 [ 887.885682] ? alloc_vfsmnt+0x762/0x9c0 [ 887.889640] ? path_lookupat+0x238/0xba0 [ 887.893687] ? mnt_free_id.isra.21+0x50/0x50 [ 887.898103] ? trace_hardirqs_off+0x10/0x10 [ 887.902407] ? putname+0xee/0x130 [ 887.905847] ? cap_capable+0x1b5/0x230 [ 887.909719] ? security_capable+0x8e/0xc0 [ 887.913851] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 887.919027] ? ns_capable_common+0xcf/0x160 [ 887.923333] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 887.928503] mount_ns+0x6d/0x190 [ 887.931852] rpc_mount+0x9e/0xd0 [ 887.935201] mount_fs+0x66/0x2d0 [ 887.938553] vfs_kern_mount.part.26+0xc6/0x4a0 [ 887.943114] ? may_umount+0xa0/0xa0 [ 887.946724] ? _raw_read_unlock+0x22/0x30 [ 887.950858] ? __get_fs_type+0x8a/0xc0 [ 887.954730] do_mount+0xea4/0x2bb0 [ 887.958249] ? __might_fault+0x110/0x1d0 [ 887.962298] ? copy_mount_string+0x40/0x40 [ 887.966512] ? check_same_owner+0x320/0x320 [ 887.970814] ? __check_object_size+0x8b/0x530 [ 887.975293] ? __might_sleep+0x95/0x190 [ 887.979255] ? kasan_check_write+0x14/0x20 [ 887.983471] ? _copy_from_user+0x99/0x110 [ 887.987603] ? memdup_user+0x5e/0x90 [ 887.991299] ? copy_mount_options+0x1f7/0x2e0 [ 887.995776] SyS_mount+0xab/0x120 [ 887.999211] ? copy_mnt_ns+0xb30/0xb30 [ 888.003082] do_syscall_64+0x281/0x940 [ 888.006952] ? vmalloc_sync_all+0x30/0x30 [ 888.011087] ? _raw_spin_unlock_irq+0x27/0x70 [ 888.015565] ? finish_task_switch+0x1c1/0x7e0 [ 888.020043] ? syscall_return_slowpath+0x550/0x550 [ 888.024959] ? syscall_return_slowpath+0x2ac/0x550 [ 888.029873] ? prepare_exit_to_usermode+0x350/0x350 [ 888.034871] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 888.040219] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.045051] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.050221] RIP: 0033:0x454e79 [ 888.053395] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 888.061086] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 888.068337] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 888.075591] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 888.082864] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 888.090113] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 888.097385] CPU: 1 PID: 26641 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 888.104655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.114005] Call Trace: [ 888.116594] dump_stack+0x194/0x24d [ 888.120223] ? arch_local_irq_restore+0x53/0x53 [ 888.124891] ? kernel_text_address+0xd1/0xe0 [ 888.129289] ? __unwind_start+0x169/0x330 [ 888.133425] should_fail+0x8c0/0xa40 [ 888.137122] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 888.142217] ? save_stack+0x43/0xd0 [ 888.145836] ? kasan_kmalloc+0xad/0xe0 [ 888.149695] ? __kmalloc+0x162/0x760 [ 888.153384] ? __list_lru_init+0xcf/0x750 [ 888.157513] ? find_held_lock+0x35/0x1d0 [ 888.161550] ? __lock_is_held+0xb6/0x140 [ 888.165587] ? check_same_owner+0x320/0x320 [ 888.169887] ? rcu_note_context_switch+0x710/0x710 [ 888.174791] should_failslab+0xec/0x120 [ 888.178741] kmem_cache_alloc_node_trace+0x5a/0x760 [ 888.183737] ? mark_held_locks+0xaf/0x100 [ 888.187858] ? __raw_spin_lock_init+0x1c/0x100 [ 888.192416] __kmalloc_node+0x33/0x70 [ 888.196199] kvmalloc_node+0x99/0xd0 [ 888.199897] __list_lru_init+0x5d5/0x750 [ 888.203937] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 888.209804] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 888.214807] ? __lockdep_init_map+0xe4/0x650 [ 888.219203] ? lockdep_init_map+0x9/0x10 [ 888.223252] sget_userns+0x691/0xe40 [ 888.226948] ? set_anon_super+0x20/0x20 [ 888.230905] ? put_filp+0x90/0x90 [ 888.234334] ? destroy_unused_super.part.6+0xd0/0xd0 [ 888.239431] ? alloc_vfsmnt+0x762/0x9c0 [ 888.243385] ? path_lookupat+0x238/0xba0 [ 888.247423] ? mnt_free_id.isra.21+0x50/0x50 [ 888.251809] ? trace_hardirqs_off+0x10/0x10 [ 888.256103] ? putname+0xee/0x130 [ 888.259538] ? cap_capable+0x1b5/0x230 [ 888.263403] ? security_capable+0x8e/0xc0 [ 888.267531] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 888.272695] ? ns_capable_common+0xcf/0x160 [ 888.276992] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 888.282167] mount_ns+0x6d/0x190 [ 888.285524] rpc_mount+0x9e/0xd0 [ 888.288879] mount_fs+0x66/0x2d0 [ 888.292226] vfs_kern_mount.part.26+0xc6/0x4a0 [ 888.296783] ? may_umount+0xa0/0xa0 [ 888.300391] ? _raw_read_unlock+0x22/0x30 [ 888.304518] ? __get_fs_type+0x8a/0xc0 [ 888.308380] do_mount+0xea4/0x2bb0 [ 888.311915] ? __might_fault+0x110/0x1d0 [ 888.315956] ? copy_mount_string+0x40/0x40 [ 888.320169] ? check_same_owner+0x320/0x320 [ 888.324471] ? __check_object_size+0x8b/0x530 [ 888.328952] ? __might_sleep+0x95/0x190 [ 888.332910] ? kasan_check_write+0x14/0x20 [ 888.337123] ? _copy_from_user+0x99/0x110 [ 888.341255] ? memdup_user+0x5e/0x90 [ 888.344941] ? copy_mount_options+0x1f7/0x2e0 [ 888.349414] SyS_mount+0xab/0x120 [ 888.352842] ? copy_mnt_ns+0xb30/0xb30 [ 888.356704] do_syscall_64+0x281/0x940 [ 888.360585] ? vmalloc_sync_all+0x30/0x30 [ 888.364714] ? _raw_spin_unlock_irq+0x27/0x70 [ 888.369189] ? finish_task_switch+0x1c1/0x7e0 [ 888.373659] ? syscall_return_slowpath+0x550/0x550 [ 888.378567] ? syscall_return_slowpath+0x2ac/0x550 [ 888.383478] ? prepare_exit_to_usermode+0x350/0x350 [ 888.388477] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 888.393827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.398687] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.403866] RIP: 0033:0x454e79 [ 888.407032] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 888.414724] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 888.421969] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 888.429217] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 19:01:37 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000680)="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", &(0x7f0000000040)=""/12}, 0x18) socketpair(0x7, 0x800, 0x20000000000000, &(0x7f00000000c0)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) 2018/03/30 19:01:37 executing program 3 (fault-call:17 fault-nth:8): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 888.436477] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 888.443730] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 2018/03/30 19:01:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:37 executing program 7 (fault-call:15 fault-nth:14): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:37 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:37 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 888.560386] FAULT_INJECTION: forcing a failure. [ 888.560386] name failslab, interval 1, probability 0, space 0, times 0 [ 888.571764] CPU: 1 PID: 26658 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 888.579039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.588388] Call Trace: [ 888.590983] dump_stack+0x194/0x24d [ 888.594617] ? arch_local_irq_restore+0x53/0x53 [ 888.599281] ? kernel_text_address+0xd1/0xe0 [ 888.603686] ? __unwind_start+0x169/0x330 [ 888.607837] should_fail+0x8c0/0xa40 [ 888.611547] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 888.613732] FAULT_INJECTION: forcing a failure. [ 888.613732] name failslab, interval 1, probability 0, space 0, times 0 [ 888.616656] ? save_stack+0x43/0xd0 [ 888.616669] ? kasan_kmalloc+0xad/0xe0 [ 888.616683] ? __kmalloc+0x162/0x760 [ 888.639019] ? __list_lru_init+0xcf/0x750 [ 888.643155] ? find_held_lock+0x35/0x1d0 [ 888.647200] ? __lock_is_held+0xb6/0x140 [ 888.651249] ? check_same_owner+0x320/0x320 [ 888.655553] ? rcu_note_context_switch+0x710/0x710 [ 888.660470] should_failslab+0xec/0x120 [ 888.664427] kmem_cache_alloc_node_trace+0x5a/0x760 [ 888.669428] ? mark_held_locks+0xaf/0x100 [ 888.673561] ? __raw_spin_lock_init+0x1c/0x100 [ 888.678128] __kmalloc_node+0x33/0x70 [ 888.682875] kvmalloc_node+0x99/0xd0 [ 888.686571] __list_lru_init+0x5d5/0x750 [ 888.690617] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 888.696488] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 888.701503] ? __lockdep_init_map+0xe4/0x650 [ 888.705895] ? lockdep_init_map+0x9/0x10 [ 888.709939] sget_userns+0x691/0xe40 [ 888.713636] ? set_anon_super+0x20/0x20 [ 888.717592] ? put_filp+0x90/0x90 [ 888.721030] ? destroy_unused_super.part.6+0xd0/0xd0 [ 888.726115] ? alloc_vfsmnt+0x762/0x9c0 [ 888.730072] ? path_lookupat+0x238/0xba0 [ 888.734127] ? mnt_free_id.isra.21+0x50/0x50 [ 888.738517] ? trace_hardirqs_off+0x10/0x10 [ 888.742821] ? putname+0xee/0x130 [ 888.746263] ? cap_capable+0x1b5/0x230 [ 888.750138] ? security_capable+0x8e/0xc0 [ 888.754273] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 888.759448] ? ns_capable_common+0xcf/0x160 [ 888.763758] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 888.768928] mount_ns+0x6d/0x190 [ 888.772281] rpc_mount+0x9e/0xd0 [ 888.775632] mount_fs+0x66/0x2d0 [ 888.778986] vfs_kern_mount.part.26+0xc6/0x4a0 [ 888.783562] ? may_umount+0xa0/0xa0 [ 888.787174] ? _raw_read_unlock+0x22/0x30 [ 888.791309] ? __get_fs_type+0x8a/0xc0 [ 888.795180] do_mount+0xea4/0x2bb0 [ 888.798702] ? __might_fault+0x110/0x1d0 [ 888.802747] ? copy_mount_string+0x40/0x40 [ 888.806965] ? check_same_owner+0x320/0x320 [ 888.811272] ? __check_object_size+0x8b/0x530 [ 888.815752] ? __might_sleep+0x95/0x190 [ 888.819715] ? kasan_check_write+0x14/0x20 [ 888.823935] ? _copy_from_user+0x99/0x110 [ 888.828066] ? memdup_user+0x5e/0x90 [ 888.831759] ? copy_mount_options+0x1f7/0x2e0 [ 888.836236] SyS_mount+0xab/0x120 [ 888.839673] ? copy_mnt_ns+0xb30/0xb30 [ 888.843545] do_syscall_64+0x281/0x940 [ 888.847416] ? vmalloc_sync_all+0x30/0x30 [ 888.851563] ? _raw_spin_unlock_irq+0x27/0x70 [ 888.856047] ? finish_task_switch+0x1c1/0x7e0 [ 888.860526] ? syscall_return_slowpath+0x550/0x550 [ 888.865442] ? syscall_return_slowpath+0x2ac/0x550 [ 888.870355] ? prepare_exit_to_usermode+0x350/0x350 [ 888.875353] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 888.880699] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 888.885527] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 888.890699] RIP: 0033:0x454e79 [ 888.893872] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 888.901565] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 888.908818] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 888.916071] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 888.923323] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 888.930575] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 888.937842] CPU: 0 PID: 26665 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 888.945110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 888.954452] Call Trace: [ 888.957036] dump_stack+0x194/0x24d [ 888.960659] ? arch_local_irq_restore+0x53/0x53 [ 888.965319] ? __save_stack_trace+0x7e/0xd0 [ 888.969630] should_fail+0x8c0/0xa40 [ 888.973323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 888.978413] ? kasan_kmalloc+0xad/0xe0 [ 888.982286] ? kmem_cache_alloc_trace+0x136/0x740 [ 888.987113] ? __memcg_init_list_lru_node+0x169/0x270 [ 888.992290] ? __list_lru_init+0x544/0x750 [ 888.996508] ? sget_userns+0x691/0xe40 [ 889.000370] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 889.005108] ? do_mount+0xea4/0x2bb0 [ 889.008800] ? SyS_mount+0xab/0x120 [ 889.012401] ? do_syscall_64+0x281/0x940 [ 889.016437] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 889.021779] ? find_held_lock+0x35/0x1d0 [ 889.025815] ? __lock_is_held+0xb6/0x140 [ 889.029855] ? check_same_owner+0x320/0x320 [ 889.034158] ? rcu_note_context_switch+0x710/0x710 [ 889.039080] should_failslab+0xec/0x120 [ 889.043048] kmem_cache_alloc_trace+0x4b/0x740 [ 889.047614] ? __kmalloc_node+0x33/0x70 [ 889.051562] ? __kmalloc_node+0x33/0x70 [ 889.055519] ? rcu_read_lock_sched_held+0x108/0x120 [ 889.060531] __memcg_init_list_lru_node+0x169/0x270 [ 889.065533] ? list_lru_add+0x7c0/0x7c0 [ 889.069484] ? __kmalloc_node+0x47/0x70 [ 889.073447] __list_lru_init+0x544/0x750 [ 889.077505] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 889.083373] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 889.088378] ? __lockdep_init_map+0xe4/0x650 [ 889.092768] ? lockdep_init_map+0x9/0x10 [ 889.096806] sget_userns+0x691/0xe40 [ 889.100499] ? set_anon_super+0x20/0x20 [ 889.104466] ? put_filp+0x90/0x90 [ 889.107904] ? destroy_unused_super.part.6+0xd0/0xd0 [ 889.112981] ? alloc_vfsmnt+0x762/0x9c0 [ 889.116936] ? path_lookupat+0x238/0xba0 [ 889.120972] ? mnt_free_id.isra.21+0x50/0x50 [ 889.125357] ? trace_hardirqs_off+0x10/0x10 [ 889.129663] ? putname+0xee/0x130 [ 889.133101] ? cap_capable+0x1b5/0x230 [ 889.136966] ? security_capable+0x8e/0xc0 [ 889.141097] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 889.146274] ? ns_capable_common+0xcf/0x160 [ 889.150576] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 889.155747] mount_ns+0x6d/0x190 [ 889.159092] rpc_mount+0x9e/0xd0 [ 889.162443] mount_fs+0x66/0x2d0 [ 889.165792] vfs_kern_mount.part.26+0xc6/0x4a0 [ 889.170349] ? may_umount+0xa0/0xa0 [ 889.173957] ? _raw_read_unlock+0x22/0x30 [ 889.178085] ? __get_fs_type+0x8a/0xc0 [ 889.181947] do_mount+0xea4/0x2bb0 [ 889.185461] ? __might_fault+0x110/0x1d0 [ 889.189503] ? copy_mount_string+0x40/0x40 [ 889.193718] ? check_same_owner+0x320/0x320 [ 889.198028] ? __check_object_size+0x8b/0x530 [ 889.202513] ? __might_sleep+0x95/0x190 [ 889.206476] ? kasan_check_write+0x14/0x20 [ 889.210692] ? _copy_from_user+0x99/0x110 [ 889.214832] ? memdup_user+0x5e/0x90 [ 889.218531] ? copy_mount_options+0x1f7/0x2e0 [ 889.223004] SyS_mount+0xab/0x120 [ 889.226441] ? copy_mnt_ns+0xb30/0xb30 [ 889.230307] do_syscall_64+0x281/0x940 [ 889.234172] ? vmalloc_sync_all+0x30/0x30 [ 889.238314] ? _raw_spin_unlock_irq+0x27/0x70 [ 889.242786] ? finish_task_switch+0x1c1/0x7e0 [ 889.247255] ? syscall_return_slowpath+0x550/0x550 [ 889.252167] ? syscall_return_slowpath+0x2ac/0x550 [ 889.257084] ? prepare_exit_to_usermode+0x350/0x350 [ 889.262083] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 889.267443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.272274] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 889.277443] RIP: 0033:0x454e79 [ 889.280619] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 889.288317] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 889.295570] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 889.302824] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 19:01:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x1de, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x4000}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:38 executing program 3 (fault-call:17 fault-nth:9): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff9, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) close(r1) [ 889.310073] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 889.317326] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e [ 889.441741] FAULT_INJECTION: forcing a failure. [ 889.441741] name failslab, interval 1, probability 0, space 0, times 0 [ 889.453069] CPU: 1 PID: 26681 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 889.460337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.469672] Call Trace: [ 889.472247] dump_stack+0x194/0x24d [ 889.475851] ? arch_local_irq_restore+0x53/0x53 [ 889.480501] should_fail+0x8c0/0xa40 [ 889.484190] ? is_bpf_text_address+0xa4/0x120 [ 889.488661] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 889.493744] ? __kernel_text_address+0xd/0x40 [ 889.498219] ? unwind_get_return_address+0x61/0xa0 [ 889.503128] ? find_held_lock+0x35/0x1d0 [ 889.507174] ? __lock_is_held+0xb6/0x140 [ 889.511216] ? check_same_owner+0x320/0x320 [ 889.515518] ? rcu_note_context_switch+0x710/0x710 [ 889.520429] should_failslab+0xec/0x120 [ 889.524384] kmem_cache_alloc_trace+0x4b/0x740 [ 889.528940] ? __kmalloc_node+0x33/0x70 [ 889.532890] ? __kmalloc_node+0x33/0x70 [ 889.536842] ? rcu_read_lock_sched_held+0x108/0x120 [ 889.541843] __memcg_init_list_lru_node+0x169/0x270 [ 889.546839] ? list_lru_add+0x7c0/0x7c0 [ 889.550789] ? __kmalloc_node+0x47/0x70 [ 889.554743] __list_lru_init+0x544/0x750 [ 889.558781] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 889.564647] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 889.569640] ? __lockdep_init_map+0xe4/0x650 [ 889.574029] ? lockdep_init_map+0x9/0x10 [ 889.578067] sget_userns+0x691/0xe40 [ 889.581753] ? set_anon_super+0x20/0x20 [ 889.585704] ? put_filp+0x90/0x90 [ 889.589132] ? destroy_unused_super.part.6+0xd0/0xd0 [ 889.594211] ? alloc_vfsmnt+0x762/0x9c0 [ 889.598163] ? path_lookupat+0x238/0xba0 [ 889.602200] ? mnt_free_id.isra.21+0x50/0x50 [ 889.606584] ? trace_hardirqs_off+0x10/0x10 [ 889.610881] ? putname+0xee/0x130 [ 889.614311] ? cap_capable+0x1b5/0x230 [ 889.618175] ? security_capable+0x8e/0xc0 [ 889.622301] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 889.627467] ? ns_capable_common+0xcf/0x160 [ 889.631765] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 889.636927] mount_ns+0x6d/0x190 [ 889.640272] rpc_mount+0x9e/0xd0 [ 889.643612] mount_fs+0x66/0x2d0 [ 889.646955] vfs_kern_mount.part.26+0xc6/0x4a0 [ 889.651509] ? may_umount+0xa0/0xa0 [ 889.655113] ? _raw_read_unlock+0x22/0x30 [ 889.659236] ? __get_fs_type+0x8a/0xc0 [ 889.663100] do_mount+0xea4/0x2bb0 [ 889.666616] ? __might_fault+0x110/0x1d0 [ 889.670653] ? copy_mount_string+0x40/0x40 [ 889.674862] ? check_same_owner+0x320/0x320 [ 889.679157] ? __check_object_size+0x8b/0x530 [ 889.683629] ? __might_sleep+0x95/0x190 [ 889.687580] ? kasan_check_write+0x14/0x20 [ 889.691792] ? _copy_from_user+0x99/0x110 [ 889.695919] ? memdup_user+0x5e/0x90 [ 889.699779] ? copy_mount_options+0x1f7/0x2e0 [ 889.704252] SyS_mount+0xab/0x120 [ 889.707678] ? copy_mnt_ns+0xb30/0xb30 [ 889.711542] do_syscall_64+0x281/0x940 [ 889.715404] ? vmalloc_sync_all+0x30/0x30 [ 889.719530] ? _raw_spin_unlock_irq+0x27/0x70 [ 889.723998] ? finish_task_switch+0x1c1/0x7e0 [ 889.728472] ? syscall_return_slowpath+0x550/0x550 [ 889.733376] ? syscall_return_slowpath+0x2ac/0x550 [ 889.738281] ? prepare_exit_to_usermode+0x350/0x350 [ 889.743273] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 889.748611] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 889.753434] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 889.758597] RIP: 0033:0x454e79 [ 889.761761] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 889.769443] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 889.776690] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 889.783936] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 889.791181] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 889.798427] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 2018/03/30 19:01:39 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8, 0x4, 0x4, 0xc427, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffffd, 0x0, 0x10020000000, 0x0}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x5) 2018/03/30 19:01:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:39 executing program 3 (fault-call:17 fault-nth:10): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) r4 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x1, 0xffff, 0xb2ea, 0x1, 0x0, 0xfffffffffffffff8, 0x40000, 0x9, 0x2, 0x1, 0x200, 0x3, 0x1ff, 0x7, 0x401, 0xe4, 0x7f, 0x100, 0x7, 0x100000001, 0xfffffffffffffffb, 0xcca7, 0x73e, 0x1, 0xa5b, 0x3ff, 0x0, 0x27, 0x5, 0x8e, 0x329, 0x1, 0x4, 0xfffffffffffffffc, 0x0, 0x6, 0x0, 0x81, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x200, 0x5, 0x3, 0x7, 0x40, 0x858c, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000280)='bpf\x00') mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r5 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r5, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) recvmsg(r2, &(0x7f00000011c0)={&(0x7f0000000580)=@generic, 0x80, &(0x7f0000001040)=[{&(0x7f0000000700)}, {&(0x7f00000009c0)=""/100, 0x64}, {&(0x7f0000000c00)=""/227, 0xe3}, {&(0x7f0000000d00)=""/189, 0xbd}, {&(0x7f0000000740)=""/25, 0x19}, {&(0x7f0000000dc0)=""/106, 0x6a}, {&(0x7f0000000e40)=""/98, 0x62}, {&(0x7f0000000a40)=""/56, 0x38}, {&(0x7f0000000ec0)=""/105, 0x69}, {&(0x7f0000000f40)=""/249, 0xf9}], 0xa, &(0x7f0000001100)=""/153, 0x99, 0x8}, 0x40000041) 2018/03/30 19:01:39 executing program 7 (fault-call:15 fault-nth:15): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 889.911357] FAULT_INJECTION: forcing a failure. [ 889.911357] name failslab, interval 1, probability 0, space 0, times 0 [ 889.922625] CPU: 0 PID: 26707 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 889.929896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.939247] Call Trace: [ 889.941832] dump_stack+0x194/0x24d [ 889.945457] ? arch_local_irq_restore+0x53/0x53 [ 889.950105] ? __save_stack_trace+0x7e/0xd0 [ 889.954410] should_fail+0x8c0/0xa40 [ 889.958109] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 889.963201] ? kasan_kmalloc+0xad/0xe0 [ 889.967074] ? kmem_cache_alloc_trace+0x136/0x740 [ 889.971899] ? __memcg_init_list_lru_node+0x169/0x270 [ 889.977075] ? __list_lru_init+0x544/0x750 [ 889.981300] ? sget_userns+0x691/0xe40 [ 889.985169] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 889.989910] ? do_mount+0xea4/0x2bb0 [ 889.993611] ? SyS_mount+0xab/0x120 [ 889.997218] ? do_syscall_64+0x281/0x940 [ 890.001267] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.006629] ? find_held_lock+0x35/0x1d0 [ 890.010672] ? __lock_is_held+0xb6/0x140 [ 890.014716] ? check_same_owner+0x320/0x320 [ 890.019025] ? rcu_note_context_switch+0x710/0x710 [ 890.023951] should_failslab+0xec/0x120 [ 890.027926] kmem_cache_alloc_trace+0x4b/0x740 [ 890.032485] ? __kmalloc_node+0x33/0x70 [ 890.036448] ? __kmalloc_node+0x33/0x70 [ 890.040416] ? rcu_read_lock_sched_held+0x108/0x120 [ 890.045416] __memcg_init_list_lru_node+0x169/0x270 [ 890.050422] ? list_lru_add+0x7c0/0x7c0 [ 890.054390] ? __kmalloc_node+0x47/0x70 [ 890.058351] __list_lru_init+0x544/0x750 [ 890.062401] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 890.068264] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 890.073266] ? __lockdep_init_map+0xe4/0x650 [ 890.077660] ? lockdep_init_map+0x9/0x10 [ 890.081706] sget_userns+0x691/0xe40 [ 890.085404] ? set_anon_super+0x20/0x20 [ 890.089372] ? put_filp+0x90/0x90 [ 890.092820] ? destroy_unused_super.part.6+0xd0/0xd0 [ 890.097909] ? alloc_vfsmnt+0x762/0x9c0 [ 890.101862] ? path_lookupat+0x238/0xba0 [ 890.105898] ? mnt_free_id.isra.21+0x50/0x50 [ 890.110291] ? trace_hardirqs_off+0x10/0x10 [ 890.114597] ? putname+0xee/0x130 [ 890.118040] ? cap_capable+0x1b5/0x230 [ 890.121912] ? security_capable+0x8e/0xc0 [ 890.126047] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 890.131223] ? ns_capable_common+0xcf/0x160 [ 890.135528] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 890.140691] mount_ns+0x6d/0x190 [ 890.144041] rpc_mount+0x9e/0xd0 [ 890.147395] mount_fs+0x66/0x2d0 [ 890.150745] vfs_kern_mount.part.26+0xc6/0x4a0 [ 890.155310] ? may_umount+0xa0/0xa0 [ 890.158928] ? _raw_read_unlock+0x22/0x30 [ 890.163066] ? __get_fs_type+0x8a/0xc0 [ 890.166935] do_mount+0xea4/0x2bb0 [ 890.170449] ? __might_fault+0x110/0x1d0 [ 890.174498] ? copy_mount_string+0x40/0x40 [ 890.178710] ? check_same_owner+0x320/0x320 [ 890.183010] ? __check_object_size+0x8b/0x530 [ 890.187495] ? __might_sleep+0x95/0x190 [ 890.191457] ? kasan_check_write+0x14/0x20 [ 890.195665] ? _copy_from_user+0x99/0x110 [ 890.199790] ? memdup_user+0x5e/0x90 [ 890.203478] ? copy_mount_options+0x1f7/0x2e0 [ 890.207953] SyS_mount+0xab/0x120 [ 890.211388] ? copy_mnt_ns+0xb30/0xb30 [ 890.215258] do_syscall_64+0x281/0x940 [ 890.219128] ? vmalloc_sync_all+0x30/0x30 [ 890.223260] ? _raw_spin_unlock_irq+0x27/0x70 [ 890.227740] ? finish_task_switch+0x1c1/0x7e0 [ 890.232217] ? syscall_return_slowpath+0x550/0x550 [ 890.237134] ? syscall_return_slowpath+0x2ac/0x550 [ 890.242051] ? prepare_exit_to_usermode+0x350/0x350 [ 890.247059] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 890.252411] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.257239] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.262407] RIP: 0033:0x454e79 [ 890.265578] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 890.273260] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 890.280502] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 890.287754] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 890.295006] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 890.302258] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 890.323722] FAULT_INJECTION: forcing a failure. [ 890.323722] name failslab, interval 1, probability 0, space 0, times 0 [ 890.334996] CPU: 0 PID: 26696 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 890.342264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.351599] Call Trace: [ 890.354179] dump_stack+0x194/0x24d [ 890.357792] ? arch_local_irq_restore+0x53/0x53 [ 890.362462] should_fail+0x8c0/0xa40 [ 890.366160] ? is_bpf_text_address+0xa4/0x120 2018/03/30 19:01:39 executing program 7 (fault-call:15 fault-nth:16): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 890.370632] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 890.375718] ? __kernel_text_address+0xd/0x40 [ 890.380203] ? unwind_get_return_address+0x61/0xa0 [ 890.385114] ? find_held_lock+0x35/0x1d0 [ 890.389154] ? __lock_is_held+0xb6/0x140 [ 890.393203] ? check_same_owner+0x320/0x320 [ 890.397513] ? rcu_note_context_switch+0x710/0x710 [ 890.402433] should_failslab+0xec/0x120 [ 890.406395] kmem_cache_alloc_trace+0x4b/0x740 [ 890.410969] ? __kmalloc_node+0x33/0x70 [ 890.414926] ? __kmalloc_node+0x33/0x70 [ 890.418882] ? rcu_read_lock_sched_held+0x108/0x120 [ 890.423893] __memcg_init_list_lru_node+0x169/0x270 [ 890.428894] ? list_lru_add+0x7c0/0x7c0 [ 890.432847] ? __kmalloc_node+0x47/0x70 [ 890.436811] __list_lru_init+0x544/0x750 [ 890.440855] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 890.446724] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 890.451716] ? __lockdep_init_map+0xe4/0x650 [ 890.456103] ? lockdep_init_map+0x9/0x10 [ 890.460145] sget_userns+0x691/0xe40 [ 890.463834] ? set_anon_super+0x20/0x20 [ 890.467795] ? put_filp+0x90/0x90 [ 890.471233] ? destroy_unused_super.part.6+0xd0/0xd0 [ 890.476317] ? alloc_vfsmnt+0x762/0x9c0 [ 890.480265] ? path_lookupat+0x238/0xba0 [ 890.484304] ? mnt_free_id.isra.21+0x50/0x50 [ 890.488692] ? trace_hardirqs_off+0x10/0x10 [ 890.492997] ? putname+0xee/0x130 [ 890.496440] ? cap_capable+0x1b5/0x230 [ 890.500314] ? security_capable+0x8e/0xc0 [ 890.504441] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 890.509607] ? ns_capable_common+0xcf/0x160 [ 890.513928] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 890.519091] mount_ns+0x6d/0x190 [ 890.522432] rpc_mount+0x9e/0xd0 [ 890.525774] mount_fs+0x66/0x2d0 [ 890.529115] vfs_kern_mount.part.26+0xc6/0x4a0 [ 890.533677] ? may_umount+0xa0/0xa0 [ 890.537288] ? _raw_read_unlock+0x22/0x30 [ 890.541420] ? __get_fs_type+0x8a/0xc0 [ 890.545291] do_mount+0xea4/0x2bb0 [ 890.548803] ? __might_fault+0x110/0x1d0 [ 890.552844] ? copy_mount_string+0x40/0x40 [ 890.557061] ? check_same_owner+0x320/0x320 [ 890.561369] ? __check_object_size+0x8b/0x530 [ 890.565850] ? __might_sleep+0x95/0x190 [ 890.569805] ? kasan_check_write+0x14/0x20 [ 890.574030] ? _copy_from_user+0x99/0x110 [ 890.578163] ? memdup_user+0x5e/0x90 [ 890.581860] ? copy_mount_options+0x1f7/0x2e0 [ 890.586342] SyS_mount+0xab/0x120 [ 890.589776] ? copy_mnt_ns+0xb30/0xb30 [ 890.593651] do_syscall_64+0x281/0x940 [ 890.597522] ? vmalloc_sync_all+0x30/0x30 [ 890.601649] ? _raw_spin_unlock_irq+0x27/0x70 [ 890.606120] ? finish_task_switch+0x1c1/0x7e0 [ 890.610592] ? syscall_return_slowpath+0x550/0x550 [ 890.615494] ? syscall_return_slowpath+0x2ac/0x550 [ 890.620399] ? prepare_exit_to_usermode+0x350/0x350 [ 890.625392] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 890.630824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 890.635646] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.640814] RIP: 0033:0x454e79 [ 890.643984] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 890.651670] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 890.658920] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 890.666161] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 19:01:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:39 executing program 3 (fault-call:17 fault-nth:11): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 890.673410] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 890.680661] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/30 19:01:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) 2018/03/30 19:01:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 890.744842] FAULT_INJECTION: forcing a failure. [ 890.744842] name failslab, interval 1, probability 0, space 0, times 0 [ 890.756165] CPU: 0 PID: 26716 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 890.763437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 890.772792] Call Trace: [ 890.775385] dump_stack+0x194/0x24d [ 890.779031] ? arch_local_irq_restore+0x53/0x53 [ 890.783713] ? __save_stack_trace+0x7e/0xd0 [ 890.788045] should_fail+0x8c0/0xa40 2018/03/30 19:01:40 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 890.791762] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 890.796869] ? kasan_kmalloc+0xad/0xe0 [ 890.815611] ? kmem_cache_alloc_trace+0x136/0x740 [ 890.820462] ? __memcg_init_list_lru_node+0x169/0x270 [ 890.825650] ? __list_lru_init+0x544/0x750 [ 890.829888] ? sget_userns+0x691/0xe40 [ 890.833778] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 890.838530] ? do_mount+0xea4/0x2bb0 [ 890.842230] ? SyS_mount+0xab/0x120 [ 890.845834] ? do_syscall_64+0x281/0x940 [ 890.850251] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 890.855603] ? find_held_lock+0x35/0x1d0 [ 890.859649] ? __lock_is_held+0xb6/0x140 [ 890.863701] ? check_same_owner+0x320/0x320 [ 890.868014] ? rcu_note_context_switch+0x710/0x710 [ 890.872929] should_failslab+0xec/0x120 [ 890.876893] kmem_cache_alloc_trace+0x4b/0x740 [ 890.881456] ? __kmalloc_node+0x33/0x70 [ 890.885403] ? __kmalloc_node+0x33/0x70 [ 890.889361] ? rcu_read_lock_sched_held+0x108/0x120 [ 890.894363] __memcg_init_list_lru_node+0x169/0x270 [ 890.899369] ? list_lru_add+0x7c0/0x7c0 [ 890.903326] ? __kmalloc_node+0x47/0x70 [ 890.907279] __list_lru_init+0x544/0x750 [ 890.911323] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 890.917191] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 890.922182] ? __lockdep_init_map+0xe4/0x650 [ 890.926563] ? lockdep_init_map+0x9/0x10 [ 890.930618] sget_userns+0x691/0xe40 [ 890.934316] ? set_anon_super+0x20/0x20 [ 890.938273] ? put_filp+0x90/0x90 [ 890.941713] ? destroy_unused_super.part.6+0xd0/0xd0 [ 890.946797] ? alloc_vfsmnt+0x762/0x9c0 [ 890.950743] ? path_lookupat+0x238/0xba0 [ 890.954778] ? mnt_free_id.isra.21+0x50/0x50 [ 890.959178] ? trace_hardirqs_off+0x10/0x10 [ 890.963483] ? putname+0xee/0x130 [ 890.966912] ? cap_capable+0x1b5/0x230 [ 890.970776] ? security_capable+0x8e/0xc0 [ 890.974909] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 890.980080] ? ns_capable_common+0xcf/0x160 [ 890.984377] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 890.989539] mount_ns+0x6d/0x190 [ 890.992885] rpc_mount+0x9e/0xd0 [ 890.996229] mount_fs+0x66/0x2d0 [ 890.999572] vfs_kern_mount.part.26+0xc6/0x4a0 [ 891.004128] ? may_umount+0xa0/0xa0 [ 891.007728] ? _raw_read_unlock+0x22/0x30 [ 891.011847] ? __get_fs_type+0x8a/0xc0 [ 891.015719] do_mount+0xea4/0x2bb0 [ 891.019237] ? __might_fault+0x110/0x1d0 [ 891.023285] ? copy_mount_string+0x40/0x40 [ 891.027501] ? check_same_owner+0x320/0x320 [ 891.031797] ? __check_object_size+0x8b/0x530 [ 891.036273] ? __might_sleep+0x95/0x190 [ 891.040227] ? kasan_check_write+0x14/0x20 [ 891.044445] ? _copy_from_user+0x99/0x110 [ 891.048589] ? memdup_user+0x5e/0x90 [ 891.052281] ? copy_mount_options+0x1f7/0x2e0 [ 891.056754] SyS_mount+0xab/0x120 [ 891.060180] ? copy_mnt_ns+0xb30/0xb30 [ 891.064054] do_syscall_64+0x281/0x940 [ 891.067924] ? vmalloc_sync_all+0x30/0x30 [ 891.072054] ? _raw_spin_unlock_irq+0x27/0x70 [ 891.076531] ? finish_task_switch+0x1c1/0x7e0 [ 891.081019] ? syscall_return_slowpath+0x550/0x550 [ 891.085939] ? syscall_return_slowpath+0x2ac/0x550 [ 891.090845] ? prepare_exit_to_usermode+0x350/0x350 [ 891.095845] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 891.101200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.106033] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 891.111218] RIP: 0033:0x454e79 [ 891.114392] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 891.122083] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 891.129326] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 891.136569] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 891.143820] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 891.151065] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/30 19:01:40 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 891.228337] FAULT_INJECTION: forcing a failure. [ 891.228337] name failslab, interval 1, probability 0, space 0, times 0 [ 891.239912] CPU: 1 PID: 26724 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 891.247290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.256638] Call Trace: [ 891.259231] dump_stack+0x194/0x24d [ 891.262861] ? arch_local_irq_restore+0x53/0x53 [ 891.267528] ? __save_stack_trace+0x7e/0xd0 [ 891.271849] should_fail+0x8c0/0xa40 [ 891.275562] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 891.280660] ? kasan_kmalloc+0xad/0xe0 [ 891.284541] ? kmem_cache_alloc_trace+0x136/0x740 [ 891.289386] ? __memcg_init_list_lru_node+0x169/0x270 [ 891.294564] ? __list_lru_init+0x544/0x750 [ 891.298792] ? sget_userns+0x691/0xe40 [ 891.302674] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 891.307420] ? do_mount+0xea4/0x2bb0 [ 891.311122] ? SyS_mount+0xab/0x120 [ 891.314743] ? do_syscall_64+0x281/0x940 [ 891.318801] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 891.324161] ? find_held_lock+0x35/0x1d0 [ 891.328221] ? __lock_is_held+0xb6/0x140 [ 891.332288] ? check_same_owner+0x320/0x320 [ 891.336605] ? rcu_note_context_switch+0x710/0x710 [ 891.341532] should_failslab+0xec/0x120 [ 891.345505] kmem_cache_alloc_trace+0x4b/0x740 [ 891.350080] ? __kmalloc_node+0x33/0x70 [ 891.354049] ? __kmalloc_node+0x33/0x70 [ 891.358022] ? rcu_read_lock_sched_held+0x108/0x120 [ 891.363040] __memcg_init_list_lru_node+0x169/0x270 [ 891.368056] ? list_lru_add+0x7c0/0x7c0 [ 891.372029] ? __kmalloc_node+0x47/0x70 2018/03/30 19:01:40 executing program 4: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000740)={0x0, 0x4, 0x10}, 0xc) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a40)={&(0x7f0000000a00)='./file0/file0\x00', 0x0, 0x10}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)={0x5, 0x3, 0x9, 0x1, 0x0, r0, 0x6}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r1, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = getpid() perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x10000, 0x4bf4, 0x37e, 0x7, 0x0, 0x800, 0x500, 0x4, 0x9, 0x9, 0xfffffffffffff5ad, 0xffff, 0x10001, 0x9, 0x71, 0x40, 0x1, 0xfffffffffffffe01, 0x85de, 0x3ff, 0x3f, 0x1, 0x2, 0x5, 0x7, 0x100000000, 0x8, 0x4, 0x1, 0x7, 0x7ff, 0xffffffffffffef12, 0x5, 0x7fff, 0x1, 0x3, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x9460, 0xf8d7, 0x10001, 0x6, 0x5, 0x0, 0x4}, r4, 0x10, r3, 0xa) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r6 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r6, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r5}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)={&(0x7f0000000280)='./file0/file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x70, &(0x7f00000017c0), 0x0, &(0x7f0000000d80)=ANY=[@ANYBLOB="22a6e4beae41bf469362012b9172016b627dece522492b225ca64d6448acffde418bf0946408cc8e5185c5cd89ae03cb6e449a0c2300bb308a2da7e43bcc7621468d5295252aebbc5bb3d407a4a5b7d498c737dfa5d3df10b2a9a6f5babd04128bf0c97aa45781c139083f80b2ce528322eabd31e87e9e08207a1c47f7d433ce99804ed0e62bf77bf95906507220cafc3f7310dc0f212cd99bd8884cc7a7ed8dde4f3c29f7eedcf059ae672a186d3e647e1fee13b6d038ec32deafeefdd4b7236b4d01aa1ff366692d2d89720bc900001e45173234afcf6f85d630b8bfdfa2528a910ad4cdd069cc024b89", @ANYRES64=r8, @ANYPTR64=&(0x7f0000000c40)=ANY=[@ANYBLOB="d741f41534044b5605c3a70b829277d73f9961ddc1d6ae2b40cab5e75db60f946509ef1dddce148dc5cafc20b595c6e6376b43baaae2a0f8d4b99485a7c9f435af1f4d916b9a19f3ee1329000b48f420a671d76e1317e706128c9f98555404ae17814fb3b35e17edf686f6204a9d8186150a90fbc82b2c6de70a410850", @ANYRES16=r1, @ANYRES32=r8, @ANYBLOB="0d5067da66805ef0c88baa040264ea414af61641131808ee65235e4c68a8800cd8fb66c0c34b", @ANYBLOB="c57d640810b88a9273e344450cfacdddee4e468c0f39ecfcefdcbb3789214508943ba7f39239f7d2e66edb1613211b02b760ca4306f28adffdc3111def247be68d4adff5339f4369859825bd8f2bbf250879ff72e12d885f2b7babe02bf4842290c51dce2d389d58d4a4698e05e572a525e7216533"]], 0xfb, 0x40000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000700)={&(0x7f00000005c0)='./file0/file0\x00', r7}, 0x10) close(0xffffffffffffffff) 2018/03/30 19:01:40 executing program 7 (fault-call:15 fault-nth:17): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:40 executing program 1: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000003200)={&(0x7f0000002fc0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000003100)=[{&(0x7f0000003040)=""/167, 0xa7}], 0x1, &(0x7f0000003140)=""/171, 0xab, 0x9d74}, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000003240)={0x2, 0x17, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0xb, 0x1, 0x0, r0}, @generic={0x6, 0x4, 0x6, 0x7}, @call={0x85, 0x0, 0x0, 0x20}, @generic={0x8, 0xffff, 0xffffffffffffff01, 0x7}, @generic={0x1, 0x100000000, 0xfff, 0x100000001}, @exit={0x95}, @alu={0x4, 0x800, 0x5, 0x0, 0x7, 0xfffffffe, 0xffffffffffffffff}, @ldst={0x1, 0x1, 0x3, 0x2, 0x8, 0x10, 0xfffffffffffffffc}, @alu={0x4, 0x30fe054a, 0xb, 0x3, 0x6, 0xffffffff}, @call={0x85, 0x0, 0x0, 0x2a}], {0x95}}, &(0x7f0000000240)='GPL\x00', 0xc15, 0x1000, &(0x7f0000000680)=""/4096, 0x41100, 0x1, [], r1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x5, 0x3, 0x4, 0x2000001, 0x0, 0x1, 0x3}, 0xffffff7c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r2, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) recvmsg$kcm(r3, &(0x7f0000000600)={&(0x7f00000002c0)=@pppol2tpv3in6, 0x80, &(0x7f0000000580)=[{&(0x7f0000000340)=""/80, 0x50}, {&(0x7f00000003c0)=""/216, 0xd8}], 0x2, &(0x7f00000005c0)=""/50, 0x32, 0x20}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r3}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f0000000000)={r3, r4}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000040)) 2018/03/30 19:01:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 891.376007] __list_lru_init+0x544/0x750 [ 891.380070] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 891.385957] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 891.390975] ? __lockdep_init_map+0xe4/0x650 [ 891.395393] ? lockdep_init_map+0x9/0x10 [ 891.399451] sget_userns+0x691/0xe40 [ 891.403159] ? set_anon_super+0x20/0x20 [ 891.407128] ? put_filp+0x90/0x90 [ 891.410574] ? destroy_unused_super.part.6+0xd0/0xd0 [ 891.415667] ? alloc_vfsmnt+0x762/0x9c0 [ 891.419632] ? path_lookupat+0x238/0xba0 [ 891.423689] ? mnt_free_id.isra.21+0x50/0x50 2018/03/30 19:01:40 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r1, 0x50, &(0x7f00000000c0)}, 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x5, 0x7, 0x0, 0x1, 0x0, 0x9, 0x4000, 0xa, 0x200, 0x6, 0x607, 0x5, 0x57f, 0x1f, 0x9, 0x7fffffff, 0x10000, 0x8, 0x200, 0x9, 0x0, 0x3ff, 0x7, 0x1, 0x589e, 0x1, 0x81, 0x7f, 0x700000000000, 0x5, 0x10000, 0x800, 0xffffffff, 0xfffffffffffff001, 0x1ff, 0x9, 0x0, 0xc6d, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x10021, 0x800, 0x800, 0x4, 0x10000, 0x7fffffff, 0x8}, r3, 0x1, r2, 0xb) [ 891.428092] ? trace_hardirqs_off+0x10/0x10 [ 891.432402] ? putname+0xee/0x130 [ 891.435848] ? cap_capable+0x1b5/0x230 [ 891.439747] ? security_capable+0x8e/0xc0 [ 891.443891] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 891.449073] ? ns_capable_common+0xcf/0x160 [ 891.453374] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 891.458546] mount_ns+0x6d/0x190 [ 891.461891] rpc_mount+0x9e/0xd0 [ 891.465231] mount_fs+0x66/0x2d0 [ 891.468573] vfs_kern_mount.part.26+0xc6/0x4a0 [ 891.473135] ? may_umount+0xa0/0xa0 [ 891.476752] ? _raw_read_unlock+0x22/0x30 [ 891.480880] ? __get_fs_type+0x8a/0xc0 [ 891.484747] do_mount+0xea4/0x2bb0 [ 891.488259] ? __might_fault+0x110/0x1d0 [ 891.492301] ? copy_mount_string+0x40/0x40 [ 891.496509] ? check_same_owner+0x320/0x320 [ 891.500916] ? __check_object_size+0x8b/0x530 [ 891.505401] ? __might_sleep+0x95/0x190 [ 891.509355] ? kasan_check_write+0x14/0x20 [ 891.513566] ? _copy_from_user+0x99/0x110 [ 891.517691] ? memdup_user+0x5e/0x90 [ 891.521377] ? copy_mount_options+0x1f7/0x2e0 [ 891.525846] SyS_mount+0xab/0x120 [ 891.529270] ? copy_mnt_ns+0xb30/0xb30 [ 891.533144] do_syscall_64+0x281/0x940 [ 891.537016] ? vmalloc_sync_all+0x30/0x30 [ 891.541144] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 891.546656] ? syscall_return_slowpath+0x550/0x550 [ 891.551589] ? syscall_return_slowpath+0x2ac/0x550 [ 891.556505] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 891.561846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 891.566668] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 891.571829] RIP: 0033:0x454e79 2018/03/30 19:01:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 891.574990] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 891.582675] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 891.589921] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 891.597165] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 891.604414] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 891.611663] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 891.692160] FAULT_INJECTION: forcing a failure. [ 891.692160] name failslab, interval 1, probability 0, space 0, times 0 [ 891.703479] CPU: 1 PID: 26752 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 891.710756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 891.720121] Call Trace: [ 891.722708] dump_stack+0x194/0x24d [ 891.726345] ? arch_local_irq_restore+0x53/0x53 [ 891.731017] ? __save_stack_trace+0x7e/0xd0 [ 891.735344] should_fail+0x8c0/0xa40 2018/03/30 19:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 891.739062] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 891.744165] ? kasan_kmalloc+0xad/0xe0 [ 891.748043] ? kmem_cache_alloc_trace+0x136/0x740 [ 891.752879] ? __memcg_init_list_lru_node+0x169/0x270 [ 891.758061] ? __list_lru_init+0x544/0x750 [ 891.762291] ? sget_userns+0x691/0xe40 [ 891.766173] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 891.770914] ? do_mount+0xea4/0x2bb0 [ 891.774616] ? SyS_mount+0xab/0x120 [ 891.778242] ? do_syscall_64+0x281/0x940 [ 891.782298] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 891.787651] ? find_held_lock+0x35/0x1d0 [ 891.791699] ? __lock_is_held+0xb6/0x140 [ 891.795745] ? check_same_owner+0x320/0x320 [ 891.800050] ? rcu_note_context_switch+0x710/0x710 [ 891.804960] should_failslab+0xec/0x120 [ 891.808912] kmem_cache_alloc_trace+0x4b/0x740 [ 891.813468] ? __kmalloc_node+0x33/0x70 [ 891.817417] ? __kmalloc_node+0x33/0x70 [ 891.821371] ? rcu_read_lock_sched_held+0x108/0x120 [ 891.826372] __memcg_init_list_lru_node+0x169/0x270 [ 891.831369] ? list_lru_add+0x7c0/0x7c0 [ 891.835319] ? __kmalloc_node+0x47/0x70 [ 891.839273] __list_lru_init+0x544/0x750 [ 891.843313] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 891.849176] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 891.854173] ? __lockdep_init_map+0xe4/0x650 [ 891.858560] ? lockdep_init_map+0x9/0x10 [ 891.862597] sget_userns+0x691/0xe40 [ 891.866283] ? set_anon_super+0x20/0x20 [ 891.870233] ? put_filp+0x90/0x90 [ 891.873660] ? destroy_unused_super.part.6+0xd0/0xd0 [ 891.878736] ? alloc_vfsmnt+0x762/0x9c0 [ 891.882686] ? path_lookupat+0x238/0xba0 [ 891.886722] ? mnt_free_id.isra.21+0x50/0x50 [ 891.891105] ? trace_hardirqs_off+0x10/0x10 [ 891.895403] ? putname+0xee/0x130 [ 891.898839] ? cap_capable+0x1b5/0x230 [ 891.902704] ? security_capable+0x8e/0xc0 [ 891.906833] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 891.911999] ? ns_capable_common+0xcf/0x160 [ 891.916302] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 891.921468] mount_ns+0x6d/0x190 [ 891.924809] rpc_mount+0x9e/0xd0 [ 891.928150] mount_fs+0x66/0x2d0 [ 891.931491] vfs_kern_mount.part.26+0xc6/0x4a0 [ 891.936045] ? may_umount+0xa0/0xa0 [ 891.939655] ? _raw_read_unlock+0x22/0x30 [ 891.943778] ? __get_fs_type+0x8a/0xc0 [ 891.947644] do_mount+0xea4/0x2bb0 [ 891.951157] ? __might_fault+0x110/0x1d0 [ 891.955195] ? copy_mount_string+0x40/0x40 [ 891.959406] ? check_same_owner+0x320/0x320 [ 891.963702] ? __check_object_size+0x8b/0x530 [ 891.968173] ? __might_sleep+0x95/0x190 [ 891.972128] ? kasan_check_write+0x14/0x20 [ 891.976337] ? _copy_from_user+0x99/0x110 [ 891.980463] ? memdup_user+0x5e/0x90 [ 891.984150] ? copy_mount_options+0x1f7/0x2e0 [ 891.988623] SyS_mount+0xab/0x120 [ 891.992052] ? copy_mnt_ns+0xb30/0xb30 [ 891.995917] do_syscall_64+0x281/0x940 [ 891.999779] ? vmalloc_sync_all+0x30/0x30 [ 892.003902] ? _raw_spin_unlock_irq+0x27/0x70 [ 892.008374] ? finish_task_switch+0x1c1/0x7e0 [ 892.012843] ? syscall_return_slowpath+0x550/0x550 [ 892.017748] ? syscall_return_slowpath+0x2ac/0x550 [ 892.022651] ? prepare_exit_to_usermode+0x350/0x350 [ 892.027641] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 892.032980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.037800] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.042963] RIP: 0033:0x454e79 [ 892.046127] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 892.053809] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 892.061053] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 892.068299] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 892.075542] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 892.082788] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/30 19:01:41 executing program 3 (fault-call:17 fault-nth:12): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:41 executing program 7 (fault-call:15 fault-nth:18): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:41 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000500)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000540)="1403456e5e14b2b4def089ee62e8740d30c0cab2376637482c74d96cc54bcdf9e5f511c54d3b3567c87ed329d8bfac7572a45eacf815d8ace6a0b7b76b3da494a93e32da217e1121704d26c4ac932df8a2f183e88578260afdca758ea5ffd30ebfb0524e9f2757850dc1073f7f12c7786871a0e411b5b6c43b890e2ba1", &(0x7f0000000c00)="29e6f94c127db1bad093781255db3d3722faff45a7c028226841fb4631f663e762e786199c166128679dfa9bc6c4a9928b0efcc4bd0fc2a3ccbd2a0d547c40f26a3924d9d80f5314abd83f1b5436e34985264293d9dc5883946498ec757eabeab2e3081e7c275529437c1ec331ec03fef14b3be6408634395ba9d15a22ef210dbf7299f152a93be5bd5b926e596ae50bfc8ca8684e5d7cf180c96cb553ea829e09d416f836f6f2111ae8244892004af396ee1aa53012dfa7d080bc6de753d9cbf469924ad0836728ef93ecb343570492f9985756b32ad53170385d43acbacdddcb7929068d79804052376ab27fd0", 0x2}, 0x20) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:41 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:41 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 892.285632] FAULT_INJECTION: forcing a failure. [ 892.285632] name failslab, interval 1, probability 0, space 0, times 0 [ 892.297015] CPU: 1 PID: 26782 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 892.297773] FAULT_INJECTION: forcing a failure. [ 892.297773] name failslab, interval 1, probability 0, space 0, times 0 [ 892.304287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.304294] Call Trace: [ 892.304311] dump_stack+0x194/0x24d [ 892.304325] ? arch_local_irq_restore+0x53/0x53 [ 892.304347] ? __save_stack_trace+0x7e/0xd0 [ 892.339976] should_fail+0x8c0/0xa40 [ 892.343681] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 892.348767] ? kasan_kmalloc+0xad/0xe0 [ 892.352648] ? kmem_cache_alloc_trace+0x136/0x740 [ 892.357471] ? __memcg_init_list_lru_node+0x169/0x270 [ 892.362642] ? __list_lru_init+0x544/0x750 [ 892.366859] ? sget_userns+0x691/0xe40 [ 892.370728] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 892.375466] ? do_mount+0xea4/0x2bb0 [ 892.379163] ? SyS_mount+0xab/0x120 [ 892.382773] ? do_syscall_64+0x281/0x940 [ 892.386818] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.392169] ? find_held_lock+0x35/0x1d0 [ 892.396217] ? __lock_is_held+0xb6/0x140 [ 892.400269] ? check_same_owner+0x320/0x320 [ 892.404576] ? rcu_note_context_switch+0x710/0x710 [ 892.409494] should_failslab+0xec/0x120 [ 892.413450] kmem_cache_alloc_trace+0x4b/0x740 [ 892.418019] ? __kmalloc_node+0x33/0x70 [ 892.421977] ? __kmalloc_node+0x33/0x70 [ 892.425933] ? rcu_read_lock_sched_held+0x108/0x120 [ 892.430938] __memcg_init_list_lru_node+0x169/0x270 [ 892.435938] ? list_lru_add+0x7c0/0x7c0 [ 892.439894] ? __kmalloc_node+0x47/0x70 [ 892.443854] __list_lru_init+0x544/0x750 [ 892.447900] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 892.453766] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 892.458766] ? __lockdep_init_map+0xe4/0x650 [ 892.463161] ? lockdep_init_map+0x9/0x10 [ 892.467204] sget_userns+0x691/0xe40 [ 892.470902] ? set_anon_super+0x20/0x20 [ 892.474859] ? put_filp+0x90/0x90 [ 892.478293] ? destroy_unused_super.part.6+0xd0/0xd0 [ 892.483379] ? alloc_vfsmnt+0x762/0x9c0 [ 892.487337] ? path_lookupat+0x238/0xba0 [ 892.491381] ? mnt_free_id.isra.21+0x50/0x50 [ 892.495774] ? trace_hardirqs_off+0x10/0x10 [ 892.500081] ? putname+0xee/0x130 [ 892.503518] ? cap_capable+0x1b5/0x230 [ 892.507390] ? security_capable+0x8e/0xc0 [ 892.511522] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 892.516694] ? ns_capable_common+0xcf/0x160 [ 892.520998] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 892.526173] mount_ns+0x6d/0x190 [ 892.529524] rpc_mount+0x9e/0xd0 [ 892.532876] mount_fs+0x66/0x2d0 [ 892.536247] vfs_kern_mount.part.26+0xc6/0x4a0 [ 892.540812] ? may_umount+0xa0/0xa0 [ 892.544421] ? _raw_read_unlock+0x22/0x30 [ 892.548553] ? __get_fs_type+0x8a/0xc0 [ 892.552427] do_mount+0xea4/0x2bb0 [ 892.555973] ? __might_fault+0x110/0x1d0 [ 892.560022] ? copy_mount_string+0x40/0x40 [ 892.564239] ? check_same_owner+0x320/0x320 [ 892.568541] ? __check_object_size+0x8b/0x530 [ 892.573022] ? __might_sleep+0x95/0x190 [ 892.576984] ? kasan_check_write+0x14/0x20 [ 892.581201] ? _copy_from_user+0x99/0x110 [ 892.585428] ? memdup_user+0x5e/0x90 [ 892.589123] ? copy_mount_options+0x1f7/0x2e0 [ 892.593600] SyS_mount+0xab/0x120 [ 892.597032] ? copy_mnt_ns+0xb30/0xb30 [ 892.600904] do_syscall_64+0x281/0x940 [ 892.604772] ? vmalloc_sync_all+0x30/0x30 [ 892.608904] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 892.614423] ? syscall_return_slowpath+0x550/0x550 [ 892.619338] ? syscall_return_slowpath+0x2ac/0x550 [ 892.624252] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 892.629598] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 892.634424] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.639593] RIP: 0033:0x454e79 [ 892.642762] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 892.650451] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 892.657703] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 892.664955] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 892.672204] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 892.679456] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c [ 892.687778] CPU: 0 PID: 26777 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 892.695055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.704404] Call Trace: [ 892.706987] dump_stack+0x194/0x24d [ 892.710611] ? arch_local_irq_restore+0x53/0x53 [ 892.715268] ? __save_stack_trace+0x7e/0xd0 [ 892.719575] should_fail+0x8c0/0xa40 [ 892.723269] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 892.728353] ? kasan_kmalloc+0xad/0xe0 [ 892.732217] ? kmem_cache_alloc_trace+0x136/0x740 [ 892.737036] ? __memcg_init_list_lru_node+0x169/0x270 [ 892.742198] ? __list_lru_init+0x544/0x750 [ 892.746406] ? sget_userns+0x691/0xe40 [ 892.750267] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 892.754996] ? do_mount+0xea4/0x2bb0 [ 892.758686] ? SyS_mount+0xab/0x120 [ 892.762286] ? do_syscall_64+0x281/0x940 [ 892.766323] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 892.771666] ? find_held_lock+0x35/0x1d0 [ 892.775704] ? __lock_is_held+0xb6/0x140 [ 892.779745] ? check_same_owner+0x320/0x320 [ 892.784044] ? rcu_note_context_switch+0x710/0x710 [ 892.788948] should_failslab+0xec/0x120 [ 892.792896] kmem_cache_alloc_trace+0x4b/0x740 [ 892.797449] ? __kmalloc_node+0x33/0x70 [ 892.801395] ? __kmalloc_node+0x33/0x70 [ 892.805344] ? rcu_read_lock_sched_held+0x108/0x120 [ 892.810338] __memcg_init_list_lru_node+0x169/0x270 [ 892.815328] ? list_lru_add+0x7c0/0x7c0 [ 892.819278] ? __kmalloc_node+0x47/0x70 [ 892.823229] __list_lru_init+0x544/0x750 [ 892.827265] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 892.833123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 892.838111] ? __lockdep_init_map+0xe4/0x650 [ 892.842495] ? lockdep_init_map+0x9/0x10 [ 892.846530] sget_userns+0x691/0xe40 [ 892.850866] ? set_anon_super+0x20/0x20 [ 892.854816] ? put_filp+0x90/0x90 [ 892.858249] ? destroy_unused_super.part.6+0xd0/0xd0 [ 892.863337] ? alloc_vfsmnt+0x762/0x9c0 [ 892.867285] ? path_lookupat+0x238/0xba0 [ 892.871323] ? mnt_free_id.isra.21+0x50/0x50 [ 892.875707] ? trace_hardirqs_off+0x10/0x10 [ 892.880004] ? putname+0xee/0x130 [ 892.883440] ? cap_capable+0x1b5/0x230 [ 892.887303] ? security_capable+0x8e/0xc0 [ 892.891430] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 892.896594] ? ns_capable_common+0xcf/0x160 [ 892.900894] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 892.906059] mount_ns+0x6d/0x190 [ 892.909400] rpc_mount+0x9e/0xd0 [ 892.912741] mount_fs+0x66/0x2d0 [ 892.916082] vfs_kern_mount.part.26+0xc6/0x4a0 [ 892.920639] ? may_umount+0xa0/0xa0 [ 892.924240] ? _raw_read_unlock+0x22/0x30 [ 892.928361] ? __get_fs_type+0x8a/0xc0 [ 892.932226] do_mount+0xea4/0x2bb0 [ 892.935740] ? __might_fault+0x110/0x1d0 [ 892.939776] ? copy_mount_string+0x40/0x40 [ 892.943987] ? check_same_owner+0x320/0x320 [ 892.948286] ? __check_object_size+0x8b/0x530 [ 892.952768] ? __might_sleep+0x95/0x190 [ 892.956720] ? kasan_check_write+0x14/0x20 [ 892.960929] ? _copy_from_user+0x99/0x110 [ 892.965053] ? memdup_user+0x5e/0x90 [ 892.968740] ? copy_mount_options+0x1f7/0x2e0 [ 892.973221] SyS_mount+0xab/0x120 [ 892.976653] ? copy_mnt_ns+0xb30/0xb30 [ 892.980519] do_syscall_64+0x281/0x940 [ 892.984380] ? vmalloc_sync_all+0x30/0x30 [ 892.988502] ? _raw_spin_unlock_irq+0x27/0x70 [ 892.992973] ? finish_task_switch+0x1c1/0x7e0 [ 892.997446] ? syscall_return_slowpath+0x550/0x550 [ 893.002352] ? syscall_return_slowpath+0x2ac/0x550 [ 893.007259] ? prepare_exit_to_usermode+0x350/0x350 [ 893.012249] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 893.017588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.022409] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 893.027575] RIP: 0033:0x454e79 [ 893.030739] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:01:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 893.038421] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 893.045666] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 893.052909] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 893.060154] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 893.067488] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/30 19:01:42 executing program 3 (fault-call:17 fault-nth:13): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:42 executing program 7 (fault-call:15 fault-nth:19): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 893.174657] FAULT_INJECTION: forcing a failure. [ 893.174657] name failslab, interval 1, probability 0, space 0, times 0 [ 893.185956] CPU: 0 PID: 26801 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 893.193228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.202578] Call Trace: [ 893.205170] dump_stack+0x194/0x24d [ 893.208806] ? arch_local_irq_restore+0x53/0x53 [ 893.213486] ? __save_stack_trace+0x7e/0xd0 [ 893.217814] should_fail+0x8c0/0xa40 [ 893.221509] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 893.226607] ? kasan_kmalloc+0xad/0xe0 [ 893.230473] ? kmem_cache_alloc_trace+0x136/0x740 [ 893.235289] ? __memcg_init_list_lru_node+0x169/0x270 [ 893.240455] ? __list_lru_init+0x544/0x750 [ 893.244666] ? sget_userns+0x691/0xe40 [ 893.248530] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 893.253262] ? do_mount+0xea4/0x2bb0 [ 893.256949] ? SyS_mount+0xab/0x120 [ 893.260552] ? do_syscall_64+0x281/0x940 [ 893.264588] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 893.269930] ? find_held_lock+0x35/0x1d0 [ 893.273969] ? __lock_is_held+0xb6/0x140 [ 893.278012] ? check_same_owner+0x320/0x320 [ 893.282315] ? rcu_note_context_switch+0x710/0x710 [ 893.287224] should_failslab+0xec/0x120 [ 893.291181] kmem_cache_alloc_trace+0x4b/0x740 [ 893.295736] ? __kmalloc_node+0x33/0x70 [ 893.299685] ? __kmalloc_node+0x33/0x70 [ 893.303638] ? rcu_read_lock_sched_held+0x108/0x120 [ 893.308632] __memcg_init_list_lru_node+0x169/0x270 [ 893.313625] ? list_lru_add+0x7c0/0x7c0 [ 893.317579] ? __kmalloc_node+0x47/0x70 [ 893.321531] __list_lru_init+0x544/0x750 [ 893.325569] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 893.331432] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 893.336423] ? __lockdep_init_map+0xe4/0x650 [ 893.340811] ? lockdep_init_map+0x9/0x10 [ 893.344849] sget_userns+0x691/0xe40 [ 893.348541] ? set_anon_super+0x20/0x20 [ 893.352492] ? put_filp+0x90/0x90 [ 893.355924] ? destroy_unused_super.part.6+0xd0/0xd0 [ 893.361002] ? alloc_vfsmnt+0x762/0x9c0 [ 893.364956] ? path_lookupat+0x238/0xba0 [ 893.368992] ? mnt_free_id.isra.21+0x50/0x50 [ 893.373381] ? trace_hardirqs_off+0x10/0x10 [ 893.377678] ? putname+0xee/0x130 [ 893.381108] ? cap_capable+0x1b5/0x230 [ 893.384972] ? security_capable+0x8e/0xc0 [ 893.389099] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 893.394265] ? ns_capable_common+0xcf/0x160 [ 893.398650] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 893.403816] mount_ns+0x6d/0x190 [ 893.407159] rpc_mount+0x9e/0xd0 [ 893.410501] mount_fs+0x66/0x2d0 [ 893.413844] vfs_kern_mount.part.26+0xc6/0x4a0 [ 893.418400] ? may_umount+0xa0/0xa0 [ 893.422003] ? _raw_read_unlock+0x22/0x30 [ 893.426132] ? __get_fs_type+0x8a/0xc0 [ 893.429997] do_mount+0xea4/0x2bb0 [ 893.433516] ? __might_fault+0x110/0x1d0 [ 893.437556] ? copy_mount_string+0x40/0x40 [ 893.441766] ? check_same_owner+0x320/0x320 [ 893.446062] ? __check_object_size+0x8b/0x530 [ 893.450538] ? __might_sleep+0x95/0x190 [ 893.454491] ? kasan_check_write+0x14/0x20 [ 893.458700] ? _copy_from_user+0x99/0x110 [ 893.462833] ? memdup_user+0x5e/0x90 [ 893.466519] ? copy_mount_options+0x1f7/0x2e0 [ 893.470989] SyS_mount+0xab/0x120 [ 893.474416] ? copy_mnt_ns+0xb30/0xb30 [ 893.478277] do_syscall_64+0x281/0x940 [ 893.482139] ? vmalloc_sync_all+0x30/0x30 [ 893.486258] ? _raw_spin_unlock_irq+0x27/0x70 [ 893.490726] ? finish_task_switch+0x1c1/0x7e0 [ 893.495198] ? syscall_return_slowpath+0x550/0x550 [ 893.500099] ? syscall_return_slowpath+0x2ac/0x550 [ 893.505002] ? prepare_exit_to_usermode+0x350/0x350 [ 893.509996] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 893.515338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.520158] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 893.525321] RIP: 0033:0x454e79 [ 893.528484] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 893.536167] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 893.543412] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 893.550655] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 893.557899] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 893.565145] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 893.584430] FAULT_INJECTION: forcing a failure. [ 893.584430] name failslab, interval 1, probability 0, space 0, times 0 [ 893.595820] CPU: 0 PID: 26810 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 893.603089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 893.612421] Call Trace: [ 893.614990] dump_stack+0x194/0x24d [ 893.618598] ? arch_local_irq_restore+0x53/0x53 [ 893.623241] ? mutex_lock_io_nested+0x1900/0x1900 [ 893.628059] ? __memcg_init_list_lru_node+0x169/0x270 [ 893.633225] should_fail+0x8c0/0xa40 [ 893.636919] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 893.642003] ? trace_hardirqs_off+0x10/0x10 [ 893.646307] ? lock_downgrade+0x980/0x980 [ 893.650432] ? trace_hardirqs_off+0x10/0x10 [ 893.654731] ? find_held_lock+0x35/0x1d0 [ 893.658769] ? __lock_is_held+0xb6/0x140 [ 893.662813] ? check_same_owner+0x320/0x320 [ 893.667112] ? rcu_note_context_switch+0x710/0x710 [ 893.672020] ? rcu_note_context_switch+0x710/0x710 [ 893.676929] should_failslab+0xec/0x120 [ 893.680881] __kmalloc+0x63/0x760 [ 893.684313] ? __kmalloc_node+0x47/0x70 [ 893.688263] ? __list_lru_init+0xcf/0x750 [ 893.692388] __list_lru_init+0xcf/0x750 [ 893.696342] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 893.702208] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 893.707203] ? lockdep_init_map+0x9/0x10 [ 893.711245] sget_userns+0x6b1/0xe40 [ 893.714935] ? set_anon_super+0x20/0x20 [ 893.718886] ? put_filp+0x90/0x90 [ 893.722314] ? destroy_unused_super.part.6+0xd0/0xd0 [ 893.727391] ? alloc_vfsmnt+0x762/0x9c0 [ 893.731348] ? path_lookupat+0x238/0xba0 [ 893.735384] ? mnt_free_id.isra.21+0x50/0x50 [ 893.739774] ? trace_hardirqs_off+0x10/0x10 [ 893.744073] ? putname+0xee/0x130 [ 893.747502] ? cap_capable+0x1b5/0x230 [ 893.751367] ? security_capable+0x8e/0xc0 [ 893.755491] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 893.760654] ? ns_capable_common+0xcf/0x160 [ 893.764952] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 893.770118] mount_ns+0x6d/0x190 [ 893.773460] rpc_mount+0x9e/0xd0 [ 893.776804] mount_fs+0x66/0x2d0 [ 893.780146] vfs_kern_mount.part.26+0xc6/0x4a0 [ 893.784702] ? may_umount+0xa0/0xa0 [ 893.788303] ? _raw_read_unlock+0x22/0x30 [ 893.792425] ? __get_fs_type+0x8a/0xc0 [ 893.796289] do_mount+0xea4/0x2bb0 [ 893.799806] ? __might_fault+0x110/0x1d0 [ 893.803845] ? copy_mount_string+0x40/0x40 [ 893.808052] ? check_same_owner+0x320/0x320 [ 893.812347] ? __check_object_size+0x8b/0x530 [ 893.816817] ? __might_sleep+0x95/0x190 [ 893.820771] ? kasan_check_write+0x14/0x20 [ 893.824981] ? _copy_from_user+0x99/0x110 [ 893.829107] ? memdup_user+0x5e/0x90 [ 893.832796] ? copy_mount_options+0x1f7/0x2e0 [ 893.837264] SyS_mount+0xab/0x120 [ 893.840695] ? copy_mnt_ns+0xb30/0xb30 [ 893.844557] do_syscall_64+0x281/0x940 [ 893.848416] ? vmalloc_sync_all+0x30/0x30 [ 893.852537] ? _raw_spin_unlock_irq+0x27/0x70 [ 893.857009] ? finish_task_switch+0x1c1/0x7e0 [ 893.861483] ? syscall_return_slowpath+0x550/0x550 [ 893.866388] ? syscall_return_slowpath+0x2ac/0x550 [ 893.871293] ? prepare_exit_to_usermode+0x350/0x350 [ 893.876283] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 893.881621] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 893.886440] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 893.891602] RIP: 0033:0x454e79 [ 893.894767] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 893.902452] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 893.909697] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 893.916942] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 893.924188] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 893.931434] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/30 19:01:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x7, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r2, 0x28, &(0x7f0000000200)}, 0x10) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x28, &(0x7f0000000500)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 7 (fault-call:15 fault-nth:20): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:43 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 3 (fault-call:17 fault-nth:14): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:43 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 894.095108] FAULT_INJECTION: forcing a failure. [ 894.095108] name failslab, interval 1, probability 0, space 0, times 0 [ 894.106390] CPU: 1 PID: 26832 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 894.113664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.123014] Call Trace: [ 894.125605] dump_stack+0x194/0x24d [ 894.129235] ? arch_local_irq_restore+0x53/0x53 [ 894.133907] ? kernel_text_address+0xd1/0xe0 [ 894.138318] ? __unwind_start+0x169/0x330 2018/03/30 19:01:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:43 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 894.142469] should_fail+0x8c0/0xa40 [ 894.146184] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 894.151281] ? save_stack+0x43/0xd0 [ 894.154885] ? kasan_kmalloc+0xad/0xe0 [ 894.158760] ? __kmalloc+0x162/0x760 [ 894.162471] ? __list_lru_init+0xcf/0x750 [ 894.166604] ? find_held_lock+0x35/0x1d0 [ 894.170643] ? __lock_is_held+0xb6/0x140 [ 894.174682] ? check_same_owner+0x320/0x320 [ 894.178985] ? rcu_note_context_switch+0x710/0x710 [ 894.183899] should_failslab+0xec/0x120 [ 894.187854] kmem_cache_alloc_node_trace+0x5a/0x760 [ 894.192858] ? mark_held_locks+0xaf/0x100 [ 894.196982] ? __raw_spin_lock_init+0x1c/0x100 [ 894.201543] __kmalloc_node+0x33/0x70 [ 894.205323] kvmalloc_node+0x99/0xd0 [ 894.209019] __list_lru_init+0x5d5/0x750 [ 894.213072] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 894.218937] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 894.223934] ? lockdep_init_map+0x9/0x10 [ 894.227978] sget_userns+0x6b1/0xe40 [ 894.231674] ? set_anon_super+0x20/0x20 [ 894.235633] ? put_filp+0x90/0x90 [ 894.239068] ? destroy_unused_super.part.6+0xd0/0xd0 [ 894.244151] ? alloc_vfsmnt+0x762/0x9c0 [ 894.248102] ? path_lookupat+0x238/0xba0 [ 894.252144] ? mnt_free_id.isra.21+0x50/0x50 [ 894.256541] ? trace_hardirqs_off+0x10/0x10 [ 894.260854] ? putname+0xee/0x130 [ 894.264303] ? cap_capable+0x1b5/0x230 [ 894.268172] ? security_capable+0x8e/0xc0 [ 894.272303] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 894.277472] ? ns_capable_common+0xcf/0x160 [ 894.281768] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 894.286933] mount_ns+0x6d/0x190 [ 894.290275] rpc_mount+0x9e/0xd0 [ 894.293633] mount_fs+0x66/0x2d0 [ 894.296990] vfs_kern_mount.part.26+0xc6/0x4a0 [ 894.301563] ? may_umount+0xa0/0xa0 [ 894.305167] ? _raw_read_unlock+0x22/0x30 [ 894.309293] ? __get_fs_type+0x8a/0xc0 [ 894.313153] do_mount+0xea4/0x2bb0 [ 894.316673] ? __might_fault+0x110/0x1d0 [ 894.320720] ? copy_mount_string+0x40/0x40 [ 894.324926] ? check_same_owner+0x320/0x320 [ 894.329224] ? __check_object_size+0x8b/0x530 [ 894.333705] ? __might_sleep+0x95/0x190 [ 894.337660] ? kasan_check_write+0x14/0x20 [ 894.341872] ? _copy_from_user+0x99/0x110 [ 894.345997] ? memdup_user+0x5e/0x90 [ 894.349689] ? copy_mount_options+0x1f7/0x2e0 [ 894.354157] SyS_mount+0xab/0x120 [ 894.357593] ? copy_mnt_ns+0xb30/0xb30 [ 894.361461] do_syscall_64+0x281/0x940 [ 894.365324] ? vmalloc_sync_all+0x30/0x30 [ 894.369446] ? _raw_spin_unlock_irq+0x27/0x70 [ 894.373915] ? finish_task_switch+0x1c1/0x7e0 [ 894.378382] ? syscall_return_slowpath+0x550/0x550 [ 894.383292] ? syscall_return_slowpath+0x2ac/0x550 [ 894.388195] ? prepare_exit_to_usermode+0x350/0x350 [ 894.393184] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 894.398579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.403399] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 894.408561] RIP: 0033:0x454e79 [ 894.411726] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 894.419407] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 894.426651] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 894.433893] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 894.441137] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 894.448381] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 894.475879] FAULT_INJECTION: forcing a failure. [ 894.475879] name failslab, interval 1, probability 0, space 0, times 0 [ 894.487254] CPU: 1 PID: 26837 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 894.494532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.503880] Call Trace: [ 894.506470] dump_stack+0x194/0x24d [ 894.510099] ? arch_local_irq_restore+0x53/0x53 [ 894.514771] ? __save_stack_trace+0x7e/0xd0 [ 894.519100] should_fail+0x8c0/0xa40 [ 894.522820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 894.527928] ? kasan_kmalloc+0xad/0xe0 [ 894.531816] ? kmem_cache_alloc_trace+0x136/0x740 [ 894.536661] ? __memcg_init_list_lru_node+0x169/0x270 [ 894.541846] ? __list_lru_init+0x544/0x750 [ 894.546068] ? sget_userns+0x691/0xe40 [ 894.549943] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 894.554688] ? do_mount+0xea4/0x2bb0 [ 894.558399] ? SyS_mount+0xab/0x120 [ 894.562011] ? do_syscall_64+0x281/0x940 [ 894.566062] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 894.571417] ? find_held_lock+0x35/0x1d0 [ 894.575478] ? __lock_is_held+0xb6/0x140 [ 894.579532] ? check_same_owner+0x320/0x320 [ 894.583847] ? rcu_note_context_switch+0x710/0x710 [ 894.588768] should_failslab+0xec/0x120 [ 894.592724] kmem_cache_alloc_trace+0x4b/0x740 [ 894.597284] ? __kmalloc_node+0x33/0x70 [ 894.601242] ? __kmalloc_node+0x33/0x70 [ 894.605211] ? rcu_read_lock_sched_held+0x108/0x120 [ 894.610214] __memcg_init_list_lru_node+0x169/0x270 [ 894.615220] ? list_lru_add+0x7c0/0x7c0 [ 894.619171] ? __kmalloc_node+0x47/0x70 [ 894.623139] __list_lru_init+0x544/0x750 [ 894.627186] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 894.633069] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 894.638072] ? __lockdep_init_map+0xe4/0x650 [ 894.642462] ? lockdep_init_map+0x9/0x10 [ 894.646501] sget_userns+0x691/0xe40 [ 894.650191] ? set_anon_super+0x20/0x20 [ 894.654139] ? put_filp+0x90/0x90 [ 894.657572] ? destroy_unused_super.part.6+0xd0/0xd0 [ 894.662666] ? alloc_vfsmnt+0x762/0x9c0 [ 894.666619] ? path_lookupat+0x238/0xba0 [ 894.670663] ? mnt_free_id.isra.21+0x50/0x50 [ 894.675065] ? trace_hardirqs_off+0x10/0x10 [ 894.679371] ? putname+0xee/0x130 [ 894.683658] ? cap_capable+0x1b5/0x230 [ 894.687524] ? security_capable+0x8e/0xc0 [ 894.691658] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 894.696836] ? ns_capable_common+0xcf/0x160 [ 894.701145] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 894.706308] mount_ns+0x6d/0x190 [ 894.709654] rpc_mount+0x9e/0xd0 [ 894.712998] mount_fs+0x66/0x2d0 [ 894.716348] vfs_kern_mount.part.26+0xc6/0x4a0 [ 894.720904] ? may_umount+0xa0/0xa0 [ 894.724517] ? _raw_read_unlock+0x22/0x30 [ 894.728650] ? __get_fs_type+0x8a/0xc0 [ 894.732515] do_mount+0xea4/0x2bb0 [ 894.736036] ? __might_fault+0x110/0x1d0 [ 894.740075] ? copy_mount_string+0x40/0x40 [ 894.744294] ? check_same_owner+0x320/0x320 [ 894.748598] ? __check_object_size+0x8b/0x530 [ 894.753080] ? __might_sleep+0x95/0x190 [ 894.757042] ? kasan_check_write+0x14/0x20 [ 894.761252] ? _copy_from_user+0x99/0x110 [ 894.765381] ? memdup_user+0x5e/0x90 [ 894.769081] ? copy_mount_options+0x1f7/0x2e0 [ 894.773553] SyS_mount+0xab/0x120 [ 894.776982] ? copy_mnt_ns+0xb30/0xb30 [ 894.780847] do_syscall_64+0x281/0x940 [ 894.784710] ? vmalloc_sync_all+0x30/0x30 [ 894.789535] ? _raw_spin_unlock_irq+0x27/0x70 [ 894.794021] ? finish_task_switch+0x1c1/0x7e0 [ 894.798505] ? syscall_return_slowpath+0x550/0x550 [ 894.803422] ? syscall_return_slowpath+0x2ac/0x550 [ 894.808339] ? prepare_exit_to_usermode+0x350/0x350 [ 894.813339] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 894.818686] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 894.823511] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 894.828675] RIP: 0033:0x454e79 [ 894.831838] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 894.839521] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 894.846765] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 894.854020] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 894.861269] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 894.868513] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/30 19:01:44 executing program 7 (fault-call:15 fault-nth:21): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:44 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x0, 0x9, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x7, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r2, 0x1000, 0x8}, 0xc) socketpair(0x10, 0xa, 0x8, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000000c0)={r3}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000080)) 2018/03/30 19:01:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000580)=0x81) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000540)={r6}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0/file0\x00', 0x0, 0x8}, 0x10) 2018/03/30 19:01:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:44 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:44 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:44 executing program 3 (fault-call:17 fault-nth:15): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 895.041671] FAULT_INJECTION: forcing a failure. [ 895.041671] name failslab, interval 1, probability 0, space 0, times 0 [ 895.052998] CPU: 0 PID: 26882 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 895.060279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.067301] FAULT_INJECTION: forcing a failure. [ 895.067301] name failslab, interval 1, probability 0, space 0, times 0 [ 895.069624] Call Trace: [ 895.069642] dump_stack+0x194/0x24d [ 895.069658] ? arch_local_irq_restore+0x53/0x53 [ 895.069677] ? __save_stack_trace+0x7e/0xd0 [ 895.095963] should_fail+0x8c0/0xa40 [ 895.099664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 895.104750] ? kasan_kmalloc+0xad/0xe0 [ 895.108624] ? kmem_cache_alloc_trace+0x136/0x740 [ 895.113450] ? __memcg_init_list_lru_node+0x169/0x270 [ 895.118621] ? __list_lru_init+0x544/0x750 [ 895.122836] ? sget_userns+0x691/0xe40 [ 895.126707] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 895.131441] ? do_mount+0xea4/0x2bb0 [ 895.135134] ? SyS_mount+0xab/0x120 [ 895.138740] ? do_syscall_64+0x281/0x940 [ 895.142795] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 895.148153] ? find_held_lock+0x35/0x1d0 [ 895.152200] ? __lock_is_held+0xb6/0x140 [ 895.156247] ? check_same_owner+0x320/0x320 [ 895.160557] ? rcu_note_context_switch+0x710/0x710 [ 895.165471] should_failslab+0xec/0x120 [ 895.169429] kmem_cache_alloc_trace+0x4b/0x740 [ 895.173991] ? __kmalloc_node+0x33/0x70 [ 895.177950] ? __kmalloc_node+0x33/0x70 [ 895.181904] ? rcu_read_lock_sched_held+0x108/0x120 [ 895.186904] __memcg_init_list_lru_node+0x169/0x270 [ 895.191905] ? list_lru_add+0x7c0/0x7c0 [ 895.195862] ? __kmalloc_node+0x47/0x70 [ 895.199820] __list_lru_init+0x544/0x750 [ 895.203867] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 895.209738] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 895.214739] ? __lockdep_init_map+0xe4/0x650 [ 895.219132] ? lockdep_init_map+0x9/0x10 [ 895.223174] sget_userns+0x691/0xe40 [ 895.226867] ? set_anon_super+0x20/0x20 [ 895.230826] ? put_filp+0x90/0x90 [ 895.234260] ? destroy_unused_super.part.6+0xd0/0xd0 [ 895.239344] ? alloc_vfsmnt+0x762/0x9c0 [ 895.243297] ? path_lookupat+0x238/0xba0 [ 895.247342] ? mnt_free_id.isra.21+0x50/0x50 [ 895.251735] ? trace_hardirqs_off+0x10/0x10 [ 895.256045] ? putname+0xee/0x130 [ 895.259485] ? cap_capable+0x1b5/0x230 [ 895.263356] ? security_capable+0x8e/0xc0 [ 895.267489] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 895.272663] ? ns_capable_common+0xcf/0x160 [ 895.276971] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 895.282139] mount_ns+0x6d/0x190 [ 895.285493] rpc_mount+0x9e/0xd0 [ 895.288843] mount_fs+0x66/0x2d0 [ 895.292195] vfs_kern_mount.part.26+0xc6/0x4a0 [ 895.296763] ? may_umount+0xa0/0xa0 [ 895.300376] ? _raw_read_unlock+0x22/0x30 [ 895.304505] ? __get_fs_type+0x8a/0xc0 [ 895.308375] do_mount+0xea4/0x2bb0 [ 895.311898] ? __might_fault+0x110/0x1d0 [ 895.315943] ? copy_mount_string+0x40/0x40 [ 895.320158] ? check_same_owner+0x320/0x320 [ 895.324463] ? __check_object_size+0x8b/0x530 [ 895.328945] ? __might_sleep+0x95/0x190 [ 895.332906] ? kasan_check_write+0x14/0x20 [ 895.337122] ? _copy_from_user+0x99/0x110 [ 895.341255] ? memdup_user+0x5e/0x90 [ 895.344953] ? copy_mount_options+0x1f7/0x2e0 [ 895.349434] SyS_mount+0xab/0x120 [ 895.352869] ? copy_mnt_ns+0xb30/0xb30 [ 895.356742] do_syscall_64+0x281/0x940 [ 895.360612] ? vmalloc_sync_all+0x30/0x30 [ 895.364741] ? _raw_spin_unlock_irq+0x27/0x70 [ 895.369223] ? finish_task_switch+0x1c1/0x7e0 [ 895.373966] ? syscall_return_slowpath+0x550/0x550 [ 895.378877] ? syscall_return_slowpath+0x2ac/0x550 [ 895.383788] ? prepare_exit_to_usermode+0x350/0x350 [ 895.388790] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 895.394139] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.398966] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 895.404135] RIP: 0033:0x454e79 [ 895.407308] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 895.415002] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 895.422255] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 895.429506] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 19:01:44 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 895.436763] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 895.444015] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 895.451283] CPU: 1 PID: 26880 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 895.458549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.467897] Call Trace: [ 895.470485] dump_stack+0x194/0x24d [ 895.474110] ? arch_local_irq_restore+0x53/0x53 [ 895.478773] should_fail+0x8c0/0xa40 [ 895.482467] ? is_bpf_text_address+0xa4/0x120 [ 895.486941] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 895.492026] ? __kernel_text_address+0xd/0x40 [ 895.496499] ? unwind_get_return_address+0x61/0xa0 [ 895.501411] ? find_held_lock+0x35/0x1d0 [ 895.505449] ? __lock_is_held+0xb6/0x140 [ 895.509584] ? check_same_owner+0x320/0x320 [ 895.513886] ? rcu_note_context_switch+0x710/0x710 [ 895.518795] should_failslab+0xec/0x120 [ 895.522743] kmem_cache_alloc_trace+0x4b/0x740 [ 895.527301] ? __kmalloc_node+0x33/0x70 [ 895.531253] ? __kmalloc_node+0x33/0x70 [ 895.535202] ? rcu_read_lock_sched_held+0x108/0x120 [ 895.540195] __memcg_init_list_lru_node+0x169/0x270 [ 895.545186] ? list_lru_add+0x7c0/0x7c0 [ 895.549132] ? __kmalloc_node+0x47/0x70 [ 895.553085] __list_lru_init+0x544/0x750 [ 895.557123] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 895.562986] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 895.567983] ? lockdep_init_map+0x9/0x10 [ 895.572023] sget_userns+0x6b1/0xe40 [ 895.575712] ? set_anon_super+0x20/0x20 [ 895.579665] ? put_filp+0x90/0x90 [ 895.583092] ? destroy_unused_super.part.6+0xd0/0xd0 [ 895.588169] ? alloc_vfsmnt+0x762/0x9c0 [ 895.592117] ? path_lookupat+0x238/0xba0 [ 895.596154] ? mnt_free_id.isra.21+0x50/0x50 [ 895.600547] ? trace_hardirqs_off+0x10/0x10 [ 895.604843] ? putname+0xee/0x130 [ 895.608271] ? cap_capable+0x1b5/0x230 [ 895.612134] ? security_capable+0x8e/0xc0 [ 895.616262] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 895.621427] ? ns_capable_common+0xcf/0x160 [ 895.625725] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 895.630887] mount_ns+0x6d/0x190 [ 895.634229] rpc_mount+0x9e/0xd0 [ 895.637576] mount_fs+0x66/0x2d0 [ 895.640917] vfs_kern_mount.part.26+0xc6/0x4a0 [ 895.645478] ? may_umount+0xa0/0xa0 [ 895.649079] ? _raw_read_unlock+0x22/0x30 [ 895.653207] ? __get_fs_type+0x8a/0xc0 [ 895.657069] do_mount+0xea4/0x2bb0 [ 895.660586] ? __might_fault+0x110/0x1d0 [ 895.664623] ? copy_mount_string+0x40/0x40 [ 895.668831] ? check_same_owner+0x320/0x320 [ 895.673125] ? __check_object_size+0x8b/0x530 [ 895.677594] ? __might_sleep+0x95/0x190 [ 895.681548] ? kasan_check_write+0x14/0x20 [ 895.685760] ? _copy_from_user+0x99/0x110 [ 895.689887] ? memdup_user+0x5e/0x90 [ 895.693576] ? copy_mount_options+0x1f7/0x2e0 [ 895.698047] SyS_mount+0xab/0x120 [ 895.701475] ? copy_mnt_ns+0xb30/0xb30 [ 895.705338] do_syscall_64+0x281/0x940 [ 895.709199] ? vmalloc_sync_all+0x30/0x30 [ 895.713322] ? _raw_spin_unlock_irq+0x27/0x70 [ 895.717792] ? finish_task_switch+0x1c1/0x7e0 [ 895.722260] ? syscall_return_slowpath+0x550/0x550 [ 895.727166] ? syscall_return_slowpath+0x2ac/0x550 [ 895.732068] ? prepare_exit_to_usermode+0x350/0x350 [ 895.737058] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 895.742398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 895.747217] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 895.752382] RIP: 0033:0x454e79 [ 895.755547] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 895.763229] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 895.770478] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 895.777723] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 895.784971] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/30 19:01:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x77) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000040)=@in={0x0, 0x0, @remote}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/126, 0x7e}, {&(0x7f0000000140)=""/8, 0x8}, {&(0x7f0000000180)=""/154, 0x9a}], 0x3, &(0x7f0000000280)=""/243, 0xf3, 0x5}, 0x10061) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 895.792216] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/30 19:01:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000640)='./file0/file0\x00', &(0x7f00000009c0)='./file0/file0\x00', &(0x7f00000005c0)='tmpfs\x00', 0x0, &(0x7f0000000700)="9da7355a277dbd7834a7eccb7e5da71753cfebec3506324068c29ebb66354041e6773c4564af80ee82ec8ab07864fda0e894a27355ebf9844c2f2efe955933b9e84968a3af04032f42e2fbf9a8c9769d6af84a8d4c39160faf7cf2bf14e09e73b0823dfed966a442f3aa2a93b0b8fa564f6afa38ef4ae94946238fb27b") r2 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x11, 0x80802, 0x40000008004, &(0x7f0000000280)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x8001, 0x3, 0xdf6f, 0x8, 0x0, 0x7f, 0xc8000, 0x1, 0x7b1866b0, 0x3, 0x4, 0x2, 0x0, 0x40, 0x10000, 0xfffffffffffffffd, 0xff, 0x41, 0x3, 0xed68, 0x8, 0x7, 0x3, 0x4, 0x4, 0x3ff, 0xfffffffffffffffa, 0xfcfd, 0x1, 0x7, 0x7f, 0x101, 0x3, 0x1, 0x400, 0x0, 0x0, 0x2, 0x6, @perf_bp={&(0x7f00000001c0), 0x5}, 0x189, 0x1000, 0x9, 0x2, 0x7, 0x3}, 0x0, 0xd, r3, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x3, &(0x7f0000002000)=ANY=[@ANYBLOB="1800000000000000000000950008dc000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000140)="e0abff3b7028acd525e954c3f849c502b871995cf5a45cde84db8b6ae4714c51bc1e6138f22376d05b66fbaaf718aef8632466c4b58a83a2c07dd301a6c5089bcebe9c76f8b26830e102543a28a46d0be02edd71895fa6672f60eaf21829f05a70dba59d32b599625409f7b86e81bc2f341624aee847e4"}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x2c) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/30 19:01:45 executing program 3 (fault-call:17 fault-nth:16): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:45 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0xc, 0x0, 0x7fff, &(0x7f0000000000)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:45 executing program 7 (fault-call:15 fault-nth:22): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:45 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 895.947708] FAULT_INJECTION: forcing a failure. [ 895.947708] name failslab, interval 1, probability 0, space 0, times 0 [ 895.959054] CPU: 0 PID: 26908 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 895.966331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.975684] Call Trace: [ 895.978273] dump_stack+0x194/0x24d [ 895.981902] ? arch_local_irq_restore+0x53/0x53 [ 895.986567] ? __save_stack_trace+0x7e/0xd0 [ 895.990878] should_fail+0x8c0/0xa40 [ 895.994574] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 895.999652] ? kasan_kmalloc+0xad/0xe0 [ 896.003515] ? kmem_cache_alloc_trace+0x136/0x740 [ 896.008331] ? __memcg_init_list_lru_node+0x169/0x270 [ 896.013496] ? __list_lru_init+0x544/0x750 [ 896.017708] ? sget_userns+0x691/0xe40 [ 896.021570] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 896.026298] ? do_mount+0xea4/0x2bb0 [ 896.029985] ? SyS_mount+0xab/0x120 [ 896.033587] ? do_syscall_64+0x281/0x940 [ 896.037625] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 896.042966] ? find_held_lock+0x35/0x1d0 [ 896.047005] ? __lock_is_held+0xb6/0x140 [ 896.051050] ? check_same_owner+0x320/0x320 [ 896.055347] ? rcu_note_context_switch+0x710/0x710 [ 896.060256] should_failslab+0xec/0x120 [ 896.064207] kmem_cache_alloc_trace+0x4b/0x740 [ 896.068764] ? __kmalloc_node+0x33/0x70 [ 896.072721] __memcg_init_list_lru_node+0x169/0x270 [ 896.077718] ? list_lru_add+0x7c0/0x7c0 [ 896.081673] ? __kmalloc_node+0x47/0x70 [ 896.085628] __list_lru_init+0x544/0x750 [ 896.089672] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 896.095533] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 896.100526] ? __lockdep_init_map+0xe4/0x650 [ 896.104912] ? lockdep_init_map+0x9/0x10 [ 896.108951] sget_userns+0x691/0xe40 [ 896.112637] ? set_anon_super+0x20/0x20 [ 896.116590] ? put_filp+0x90/0x90 [ 896.120023] ? destroy_unused_super.part.6+0xd0/0xd0 [ 896.125101] ? alloc_vfsmnt+0x762/0x9c0 [ 896.129051] ? path_lookupat+0x238/0xba0 [ 896.133088] ? mnt_free_id.isra.21+0x50/0x50 [ 896.137471] ? trace_hardirqs_off+0x10/0x10 [ 896.141764] ? putname+0xee/0x130 [ 896.145192] ? cap_capable+0x1b5/0x230 [ 896.149058] ? security_capable+0x8e/0xc0 [ 896.153184] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 896.158348] ? ns_capable_common+0xcf/0x160 [ 896.162645] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 896.167810] mount_ns+0x6d/0x190 [ 896.171153] rpc_mount+0x9e/0xd0 [ 896.174494] mount_fs+0x66/0x2d0 [ 896.177838] vfs_kern_mount.part.26+0xc6/0x4a0 [ 896.182396] ? may_umount+0xa0/0xa0 [ 896.185997] ? _raw_read_unlock+0x22/0x30 [ 896.190126] ? __get_fs_type+0x8a/0xc0 [ 896.193992] do_mount+0xea4/0x2bb0 [ 896.197509] ? __might_fault+0x110/0x1d0 [ 896.201546] ? copy_mount_string+0x40/0x40 [ 896.205756] ? check_same_owner+0x320/0x320 [ 896.210055] ? __check_object_size+0x8b/0x530 [ 896.214528] ? __might_sleep+0x95/0x190 [ 896.218480] ? kasan_check_write+0x14/0x20 [ 896.222692] ? _copy_from_user+0x99/0x110 [ 896.226819] ? memdup_user+0x5e/0x90 [ 896.230507] ? copy_mount_options+0x1f7/0x2e0 [ 896.234978] SyS_mount+0xab/0x120 [ 896.238403] ? copy_mnt_ns+0xb30/0xb30 [ 896.242266] do_syscall_64+0x281/0x940 [ 896.246128] ? vmalloc_sync_all+0x30/0x30 [ 896.250250] ? _raw_spin_unlock_irq+0x27/0x70 [ 896.254720] ? finish_task_switch+0x1c1/0x7e0 [ 896.259192] ? syscall_return_slowpath+0x550/0x550 [ 896.264106] ? syscall_return_slowpath+0x2ac/0x550 [ 896.269012] ? prepare_exit_to_usermode+0x350/0x350 [ 896.274006] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 896.279349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.284170] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 896.289336] RIP: 0033:0x454e79 [ 896.292501] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 896.300185] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 896.307427] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 896.314672] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 896.321915] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 896.329157] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 896.403497] FAULT_INJECTION: forcing a failure. [ 896.403497] name failslab, interval 1, probability 0, space 0, times 0 [ 896.414908] CPU: 0 PID: 26920 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 896.422181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.431526] Call Trace: [ 896.434103] dump_stack+0x194/0x24d [ 896.437708] ? arch_local_irq_restore+0x53/0x53 [ 896.442361] should_fail+0x8c0/0xa40 [ 896.446138] ? is_bpf_text_address+0xa4/0x120 [ 896.450608] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 896.455688] ? __kernel_text_address+0xd/0x40 [ 896.460163] ? unwind_get_return_address+0x61/0xa0 [ 896.465074] ? find_held_lock+0x35/0x1d0 [ 896.469111] ? __lock_is_held+0xb6/0x140 [ 896.473153] ? check_same_owner+0x320/0x320 [ 896.477452] ? rcu_note_context_switch+0x710/0x710 [ 896.482361] should_failslab+0xec/0x120 [ 896.486314] kmem_cache_alloc_trace+0x4b/0x740 [ 896.490871] ? __kmalloc_node+0x33/0x70 [ 896.494819] ? __kmalloc_node+0x33/0x70 [ 896.498768] ? rcu_read_lock_sched_held+0x108/0x120 [ 896.503762] __memcg_init_list_lru_node+0x169/0x270 [ 896.508755] ? list_lru_add+0x7c0/0x7c0 [ 896.512704] ? __kmalloc_node+0x47/0x70 [ 896.516657] __list_lru_init+0x544/0x750 [ 896.520699] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 896.526564] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 896.531562] ? lockdep_init_map+0x9/0x10 [ 896.535600] sget_userns+0x6b1/0xe40 [ 896.539290] ? set_anon_super+0x20/0x20 [ 896.543239] ? put_filp+0x90/0x90 [ 896.546667] ? destroy_unused_super.part.6+0xd0/0xd0 [ 896.551746] ? alloc_vfsmnt+0x762/0x9c0 [ 896.555696] ? path_lookupat+0x238/0xba0 [ 896.559738] ? mnt_free_id.isra.21+0x50/0x50 [ 896.564127] ? trace_hardirqs_off+0x10/0x10 [ 896.568424] ? putname+0xee/0x130 [ 896.571854] ? cap_capable+0x1b5/0x230 [ 896.575729] ? security_capable+0x8e/0xc0 [ 896.579854] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 896.585026] ? ns_capable_common+0xcf/0x160 [ 896.589321] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 896.594485] mount_ns+0x6d/0x190 [ 896.597828] rpc_mount+0x9e/0xd0 [ 896.601172] mount_fs+0x66/0x2d0 [ 896.604513] vfs_kern_mount.part.26+0xc6/0x4a0 [ 896.609068] ? may_umount+0xa0/0xa0 [ 896.612668] ? _raw_read_unlock+0x22/0x30 [ 896.616792] ? __get_fs_type+0x8a/0xc0 [ 896.620655] do_mount+0xea4/0x2bb0 [ 896.624168] ? __might_fault+0x110/0x1d0 [ 896.628203] ? copy_mount_string+0x40/0x40 [ 896.632412] ? check_same_owner+0x320/0x320 [ 896.636709] ? __check_object_size+0x8b/0x530 [ 896.641184] ? __might_sleep+0x95/0x190 [ 896.645136] ? kasan_check_write+0x14/0x20 [ 896.649345] ? _copy_from_user+0x99/0x110 [ 896.653469] ? memdup_user+0x5e/0x90 [ 896.657157] ? copy_mount_options+0x1f7/0x2e0 [ 896.661625] SyS_mount+0xab/0x120 [ 896.665049] ? copy_mnt_ns+0xb30/0xb30 [ 896.668910] do_syscall_64+0x281/0x940 [ 896.672772] ? vmalloc_sync_all+0x30/0x30 [ 896.676894] ? _raw_spin_unlock_irq+0x27/0x70 [ 896.681375] ? finish_task_switch+0x1c1/0x7e0 [ 896.685847] ? syscall_return_slowpath+0x550/0x550 [ 896.690751] ? syscall_return_slowpath+0x2ac/0x550 [ 896.695654] ? prepare_exit_to_usermode+0x350/0x350 [ 896.700650] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 896.705988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 896.710807] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 896.715969] RIP: 0033:0x454e79 [ 896.719132] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 896.726813] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 896.734059] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 896.741302] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 896.748545] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 896.755790] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/30 19:01:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xf, 0xa, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x4}, @map={0x18, 0x3, 0x1, 0x0, r1}, @ldst={0x3, 0x0, 0x1, 0x7, 0x8, 0xe, 0x11}, @call={0x85, 0x0, 0x0, 0xc}, @generic={0xa5, 0x8, 0x1ff, 0x9}], &(0x7f0000000280)='GPL\x00', 0x1, 0xb8, &(0x7f00000009c0)=""/184, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000700)=r3, 0x4) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r5 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r5, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r4}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 3 (fault-call:17 fault-nth:17): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 7 (fault-call:15 fault-nth:23): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) 2018/03/30 19:01:46 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 896.872502] FAULT_INJECTION: forcing a failure. [ 896.872502] name failslab, interval 1, probability 0, space 0, times 0 [ 896.883888] CPU: 0 PID: 26943 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 896.891166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 896.900515] Call Trace: [ 896.903120] dump_stack+0x194/0x24d [ 896.906736] ? arch_local_irq_restore+0x53/0x53 [ 896.911387] ? __save_stack_trace+0x7e/0xd0 [ 896.915692] should_fail+0x8c0/0xa40 [ 896.919387] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 896.924467] ? kasan_kmalloc+0xad/0xe0 [ 896.928328] ? kmem_cache_alloc_trace+0x136/0x740 [ 896.933145] ? __memcg_init_list_lru_node+0x169/0x270 [ 896.938306] ? __list_lru_init+0x544/0x750 [ 896.942513] ? sget_userns+0x6b1/0xe40 [ 896.946379] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 896.951106] ? do_mount+0xea4/0x2bb0 [ 896.954794] ? SyS_mount+0xab/0x120 [ 896.958397] ? do_syscall_64+0x281/0x940 [ 896.962438] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 896.967780] ? find_held_lock+0x35/0x1d0 [ 896.971818] ? __lock_is_held+0xb6/0x140 [ 896.975858] ? check_same_owner+0x320/0x320 [ 896.980155] ? rcu_note_context_switch+0x710/0x710 [ 896.985063] should_failslab+0xec/0x120 [ 896.989016] kmem_cache_alloc_trace+0x4b/0x740 [ 896.993578] ? __kmalloc_node+0x33/0x70 [ 896.997529] ? __kmalloc_node+0x33/0x70 [ 897.001477] ? rcu_read_lock_sched_held+0x108/0x120 [ 897.006469] __memcg_init_list_lru_node+0x169/0x270 [ 897.011460] ? list_lru_add+0x7c0/0x7c0 [ 897.015406] ? __kmalloc_node+0x47/0x70 [ 897.019359] __list_lru_init+0x544/0x750 [ 897.023398] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 897.029257] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 897.034253] ? lockdep_init_map+0x9/0x10 [ 897.038290] sget_userns+0x6b1/0xe40 [ 897.041978] ? set_anon_super+0x20/0x20 [ 897.045926] ? put_filp+0x90/0x90 [ 897.049353] ? destroy_unused_super.part.6+0xd0/0xd0 [ 897.054429] ? alloc_vfsmnt+0x762/0x9c0 [ 897.058376] ? path_lookupat+0x238/0xba0 [ 897.062413] ? mnt_free_id.isra.21+0x50/0x50 [ 897.066796] ? trace_hardirqs_off+0x10/0x10 [ 897.071093] ? putname+0xee/0x130 [ 897.074525] ? cap_capable+0x1b5/0x230 [ 897.078387] ? security_capable+0x8e/0xc0 [ 897.082521] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 897.087688] ? ns_capable_common+0xcf/0x160 [ 897.091987] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 897.097155] mount_ns+0x6d/0x190 [ 897.100495] rpc_mount+0x9e/0xd0 [ 897.103835] mount_fs+0x66/0x2d0 [ 897.107179] vfs_kern_mount.part.26+0xc6/0x4a0 [ 897.111736] ? may_umount+0xa0/0xa0 [ 897.115337] ? _raw_read_unlock+0x22/0x30 [ 897.119458] ? __get_fs_type+0x8a/0xc0 [ 897.123322] do_mount+0xea4/0x2bb0 [ 897.126833] ? __might_fault+0x110/0x1d0 [ 897.130868] ? copy_mount_string+0x40/0x40 [ 897.135080] ? check_same_owner+0x320/0x320 [ 897.139378] ? __check_object_size+0x8b/0x530 [ 897.143849] ? __might_sleep+0x95/0x190 [ 897.147801] ? kasan_check_write+0x14/0x20 [ 897.152015] ? _copy_from_user+0x99/0x110 [ 897.156141] ? memdup_user+0x5e/0x90 [ 897.159826] ? copy_mount_options+0x1f7/0x2e0 [ 897.164298] SyS_mount+0xab/0x120 [ 897.167725] ? copy_mnt_ns+0xb30/0xb30 [ 897.171590] do_syscall_64+0x281/0x940 [ 897.175451] ? vmalloc_sync_all+0x30/0x30 [ 897.179570] ? _raw_spin_unlock_irq+0x27/0x70 [ 897.184041] ? finish_task_switch+0x1c1/0x7e0 [ 897.188512] ? syscall_return_slowpath+0x550/0x550 [ 897.193416] ? syscall_return_slowpath+0x2ac/0x550 [ 897.198319] ? prepare_exit_to_usermode+0x350/0x350 [ 897.203308] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 897.208645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 897.213482] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 897.218647] RIP: 0033:0x454e79 [ 897.221809] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 897.229488] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 897.236731] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 897.243975] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 897.251215] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 897.258458] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 897.281857] FAULT_INJECTION: forcing a failure. [ 897.281857] name failslab, interval 1, probability 0, space 0, times 0 [ 897.293119] CPU: 1 PID: 26945 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 897.300388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.309732] Call Trace: [ 897.312305] dump_stack+0x194/0x24d [ 897.315918] ? arch_local_irq_restore+0x53/0x53 [ 897.320565] ? __save_stack_trace+0x7e/0xd0 [ 897.324863] should_fail+0x8c0/0xa40 [ 897.328553] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 897.333632] ? kasan_kmalloc+0xad/0xe0 [ 897.337493] ? kmem_cache_alloc_trace+0x136/0x740 [ 897.342310] ? __memcg_init_list_lru_node+0x169/0x270 [ 897.347473] ? __list_lru_init+0x544/0x750 [ 897.351683] ? sget_userns+0x691/0xe40 [ 897.355545] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 897.360278] ? do_mount+0xea4/0x2bb0 [ 897.363968] ? SyS_mount+0xab/0x120 [ 897.367574] ? do_syscall_64+0x281/0x940 [ 897.371614] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 897.376955] ? find_held_lock+0x35/0x1d0 [ 897.380993] ? __lock_is_held+0xb6/0x140 [ 897.385035] ? check_same_owner+0x320/0x320 [ 897.389333] ? rcu_note_context_switch+0x710/0x710 [ 897.394239] should_failslab+0xec/0x120 [ 897.398189] kmem_cache_alloc_trace+0x4b/0x740 [ 897.402748] ? __kmalloc_node+0x33/0x70 [ 897.406695] ? __kmalloc_node+0x33/0x70 [ 897.410645] ? rcu_read_lock_sched_held+0x108/0x120 [ 897.415640] __memcg_init_list_lru_node+0x169/0x270 [ 897.420631] ? list_lru_add+0x7c0/0x7c0 [ 897.424583] ? __kmalloc_node+0x47/0x70 [ 897.428535] __list_lru_init+0x544/0x750 [ 897.432576] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 897.438440] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 897.443431] ? __lockdep_init_map+0xe4/0x650 [ 897.447815] ? lockdep_init_map+0x9/0x10 [ 897.451853] sget_userns+0x691/0xe40 [ 897.455543] ? set_anon_super+0x20/0x20 [ 897.459495] ? put_filp+0x90/0x90 [ 897.462923] ? destroy_unused_super.part.6+0xd0/0xd0 [ 897.468003] ? alloc_vfsmnt+0x762/0x9c0 [ 897.471954] ? path_lookupat+0x238/0xba0 [ 897.475989] ? mnt_free_id.isra.21+0x50/0x50 [ 897.480375] ? trace_hardirqs_off+0x10/0x10 [ 897.484669] ? putname+0xee/0x130 [ 897.488100] ? cap_capable+0x1b5/0x230 [ 897.491967] ? security_capable+0x8e/0xc0 [ 897.496094] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 897.501257] ? ns_capable_common+0xcf/0x160 [ 897.505554] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 897.510724] mount_ns+0x6d/0x190 [ 897.514065] rpc_mount+0x9e/0xd0 [ 897.517408] mount_fs+0x66/0x2d0 [ 897.520750] vfs_kern_mount.part.26+0xc6/0x4a0 [ 897.525305] ? may_umount+0xa0/0xa0 [ 897.528907] ? _raw_read_unlock+0x22/0x30 [ 897.533028] ? __get_fs_type+0x8a/0xc0 [ 897.536894] do_mount+0xea4/0x2bb0 [ 897.540407] ? __might_fault+0x110/0x1d0 [ 897.544447] ? copy_mount_string+0x40/0x40 [ 897.548658] ? check_same_owner+0x320/0x320 [ 897.552956] ? __check_object_size+0x8b/0x530 [ 897.557428] ? __might_sleep+0x95/0x190 [ 897.561380] ? kasan_check_write+0x14/0x20 [ 897.565592] ? _copy_from_user+0x99/0x110 [ 897.569715] ? memdup_user+0x5e/0x90 [ 897.573402] ? copy_mount_options+0x1f7/0x2e0 [ 897.577872] SyS_mount+0xab/0x120 [ 897.581301] ? copy_mnt_ns+0xb30/0xb30 [ 897.585164] do_syscall_64+0x281/0x940 [ 897.589030] ? vmalloc_sync_all+0x30/0x30 [ 897.593151] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 897.598661] ? syscall_return_slowpath+0x550/0x550 [ 897.603568] ? syscall_return_slowpath+0x2ac/0x550 [ 897.608473] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 897.613815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 897.618634] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 897.623797] RIP: 0033:0x454e79 2018/03/30 19:01:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 897.626959] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 897.634643] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 897.641886] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 897.649131] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 897.656375] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 897.663619] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/30 19:01:46 executing program 7 (fault-call:15 fault-nth:24): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:46 executing program 3 (fault-call:17 fault-nth:18): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000200)={r3, 0x50, &(0x7f0000000500)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r4, 0x4) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) 2018/03/30 19:01:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x0, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 897.815137] FAULT_INJECTION: forcing a failure. [ 897.815137] name failslab, interval 1, probability 0, space 0, times 0 [ 897.826576] CPU: 1 PID: 26968 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 897.833846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.843196] Call Trace: [ 897.845789] dump_stack+0x194/0x24d [ 897.849416] ? arch_local_irq_restore+0x53/0x53 [ 897.854086] ? __save_stack_trace+0x7e/0xd0 [ 897.857056] FAULT_INJECTION: forcing a failure. [ 897.857056] name failslab, interval 1, probability 0, space 0, times 0 [ 897.858403] should_fail+0x8c0/0xa40 [ 897.858418] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 897.858443] ? kasan_kmalloc+0xad/0xe0 [ 897.882238] ? kmem_cache_alloc_trace+0x136/0x740 [ 897.887065] ? __memcg_init_list_lru_node+0x169/0x270 [ 897.892238] ? __list_lru_init+0x544/0x750 [ 897.896457] ? sget_userns+0x691/0xe40 [ 897.900330] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 897.905067] ? do_mount+0xea4/0x2bb0 [ 897.908762] ? SyS_mount+0xab/0x120 [ 897.912373] ? do_syscall_64+0x281/0x940 [ 897.916417] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 897.921764] ? find_held_lock+0x35/0x1d0 [ 897.925814] ? __lock_is_held+0xb6/0x140 [ 897.929863] ? check_same_owner+0x320/0x320 [ 897.934168] ? rcu_note_context_switch+0x710/0x710 [ 897.939090] should_failslab+0xec/0x120 [ 897.943046] kmem_cache_alloc_trace+0x4b/0x740 [ 897.947607] ? __kmalloc_node+0x33/0x70 [ 897.951561] ? __kmalloc_node+0x33/0x70 [ 897.955516] ? rcu_read_lock_sched_held+0x108/0x120 [ 897.960516] __memcg_init_list_lru_node+0x169/0x270 [ 897.965515] ? list_lru_add+0x7c0/0x7c0 [ 897.969471] ? __kmalloc_node+0x47/0x70 [ 897.973433] __list_lru_init+0x544/0x750 [ 897.977489] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 897.983357] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 897.988354] ? __lockdep_init_map+0xe4/0x650 [ 897.992746] ? lockdep_init_map+0x9/0x10 [ 897.996790] sget_userns+0x691/0xe40 [ 898.000482] ? set_anon_super+0x20/0x20 [ 898.004438] ? put_filp+0x90/0x90 [ 898.007873] ? destroy_unused_super.part.6+0xd0/0xd0 [ 898.012960] ? alloc_vfsmnt+0x762/0x9c0 [ 898.016914] ? path_lookupat+0x238/0xba0 [ 898.020959] ? mnt_free_id.isra.21+0x50/0x50 [ 898.025350] ? trace_hardirqs_off+0x10/0x10 [ 898.029651] ? putname+0xee/0x130 [ 898.033092] ? cap_capable+0x1b5/0x230 [ 898.036964] ? security_capable+0x8e/0xc0 [ 898.041094] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 898.046266] ? ns_capable_common+0xcf/0x160 [ 898.050577] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 898.055753] mount_ns+0x6d/0x190 [ 898.059105] rpc_mount+0x9e/0xd0 [ 898.062452] mount_fs+0x66/0x2d0 [ 898.065801] vfs_kern_mount.part.26+0xc6/0x4a0 [ 898.070364] ? may_umount+0xa0/0xa0 [ 898.073976] ? _raw_read_unlock+0x22/0x30 [ 898.078106] ? __get_fs_type+0x8a/0xc0 [ 898.081992] do_mount+0xea4/0x2bb0 [ 898.085516] ? __might_fault+0x110/0x1d0 [ 898.089561] ? copy_mount_string+0x40/0x40 [ 898.093776] ? check_same_owner+0x320/0x320 [ 898.098077] ? __check_object_size+0x8b/0x530 [ 898.102561] ? __might_sleep+0x95/0x190 [ 898.106521] ? kasan_check_write+0x14/0x20 [ 898.110763] ? _copy_from_user+0x99/0x110 [ 898.114894] ? memdup_user+0x5e/0x90 [ 898.118588] ? copy_mount_options+0x1f7/0x2e0 [ 898.123065] SyS_mount+0xab/0x120 [ 898.126501] ? copy_mnt_ns+0xb30/0xb30 [ 898.130370] do_syscall_64+0x281/0x940 [ 898.134237] ? vmalloc_sync_all+0x30/0x30 [ 898.138366] ? finish_task_switch+0x1c1/0x7e0 [ 898.142842] ? syscall_return_slowpath+0x550/0x550 [ 898.147754] ? syscall_return_slowpath+0x2ac/0x550 [ 898.152667] ? prepare_exit_to_usermode+0x350/0x350 [ 898.157667] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 898.163016] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.167845] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 898.173019] RIP: 0033:0x454e79 [ 898.176191] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 898.183879] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 898.191129] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 898.198379] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 898.205629] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 898.212878] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 [ 898.220144] CPU: 0 PID: 26967 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 898.227409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.236745] Call Trace: [ 898.239317] dump_stack+0x194/0x24d [ 898.242920] ? arch_local_irq_restore+0x53/0x53 [ 898.247564] ? __save_stack_trace+0x7e/0xd0 [ 898.251863] should_fail+0x8c0/0xa40 [ 898.255565] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 898.260643] ? kasan_kmalloc+0xad/0xe0 [ 898.264502] ? kmem_cache_alloc_trace+0x136/0x740 [ 898.269317] ? __memcg_init_list_lru_node+0x169/0x270 [ 898.274481] ? __list_lru_init+0x544/0x750 [ 898.278690] ? sget_userns+0x6b1/0xe40 [ 898.282552] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 898.287280] ? do_mount+0xea4/0x2bb0 [ 898.290965] ? SyS_mount+0xab/0x120 [ 898.294565] ? do_syscall_64+0x281/0x940 [ 898.298601] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 898.303941] ? find_held_lock+0x35/0x1d0 [ 898.307979] ? __lock_is_held+0xb6/0x140 [ 898.312026] ? check_same_owner+0x320/0x320 [ 898.316327] ? rcu_note_context_switch+0x710/0x710 [ 898.321232] should_failslab+0xec/0x120 [ 898.325184] kmem_cache_alloc_trace+0x4b/0x740 [ 898.329740] ? __kmalloc_node+0x33/0x70 [ 898.333688] ? __kmalloc_node+0x33/0x70 [ 898.337639] ? rcu_read_lock_sched_held+0x108/0x120 [ 898.342629] __memcg_init_list_lru_node+0x169/0x270 [ 898.347620] ? list_lru_add+0x7c0/0x7c0 [ 898.351569] ? __kmalloc_node+0x47/0x70 [ 898.355519] __list_lru_init+0x544/0x750 [ 898.359555] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 898.365414] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 898.370405] ? lockdep_init_map+0x9/0x10 [ 898.374442] sget_userns+0x6b1/0xe40 [ 898.378131] ? set_anon_super+0x20/0x20 [ 898.382080] ? put_filp+0x90/0x90 [ 898.385507] ? destroy_unused_super.part.6+0xd0/0xd0 [ 898.390584] ? alloc_vfsmnt+0x762/0x9c0 [ 898.394531] ? path_lookupat+0x238/0xba0 [ 898.398566] ? mnt_free_id.isra.21+0x50/0x50 [ 898.402948] ? trace_hardirqs_off+0x10/0x10 [ 898.407246] ? putname+0xee/0x130 [ 898.410680] ? cap_capable+0x1b5/0x230 [ 898.414554] ? security_capable+0x8e/0xc0 [ 898.418679] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 898.423845] ? ns_capable_common+0xcf/0x160 [ 898.428237] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 898.433399] mount_ns+0x6d/0x190 [ 898.436778] rpc_mount+0x9e/0xd0 [ 898.440118] mount_fs+0x66/0x2d0 [ 898.443460] vfs_kern_mount.part.26+0xc6/0x4a0 [ 898.448019] ? may_umount+0xa0/0xa0 [ 898.451621] ? _raw_read_unlock+0x22/0x30 [ 898.455741] ? __get_fs_type+0x8a/0xc0 [ 898.459603] do_mount+0xea4/0x2bb0 [ 898.463115] ? __might_fault+0x110/0x1d0 [ 898.467153] ? copy_mount_string+0x40/0x40 [ 898.471360] ? check_same_owner+0x320/0x320 [ 898.475658] ? __check_object_size+0x8b/0x530 [ 898.480132] ? __might_sleep+0x95/0x190 [ 898.484084] ? kasan_check_write+0x14/0x20 [ 898.488291] ? _copy_from_user+0x99/0x110 [ 898.492416] ? memdup_user+0x5e/0x90 [ 898.496106] ? copy_mount_options+0x1f7/0x2e0 [ 898.500576] SyS_mount+0xab/0x120 [ 898.504001] ? copy_mnt_ns+0xb30/0xb30 [ 898.507868] do_syscall_64+0x281/0x940 [ 898.511728] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 898.517241] ? syscall_return_slowpath+0x550/0x550 [ 898.522143] ? syscall_return_slowpath+0x2ac/0x550 [ 898.527049] ? retint_user+0x18/0x18 [ 898.530741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 898.535560] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 898.540725] RIP: 0033:0x454e79 [ 898.543891] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 898.551572] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 898.558819] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 898.566061] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 898.573303] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 898.580548] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/30 19:01:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 7 (fault-call:15 fault-nth:25): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0", 0xa2}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x0, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 2018/03/30 19:01:47 executing program 3 (fault-call:17 fault-nth:19): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) sendmsg(r2, &(0x7f0000000280)={&(0x7f0000000500)=@ipx={0x4, 0x40, 0x0, "251fca7eb40d", 0x20}, 0x80, &(0x7f0000000700)=[{&(0x7f00000009c0)="b0152ae1094d602113eb0343528e8e2ec80071d016b2cfa3c777c82cc7ca2b6f9418228207b8b3125e49d76f5d56fccbe3bd739757d23dfdacfb6f0e7a79445b4036ee327fe9630465fe2ba175552eeffb9870c27953c06144038724efe076748e945dffc5be4f3e5d10f727016a15dd78451c4616e107a2859393ade2368b3363ea1fb9ea1222180f9c58be6848653eb66998b9be8f0a6c49", 0x99}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000001c00)="032f8480785a7b614aee91b6d3eaceeb1fee8e02a0a4214975a4200af7fa80ffcd0420e08baff3aee96a20135d9ac41276e49b00ed479e2f664ca2dabda2a5d0354560dbe5df129bfe6ed0309685ed0246723155430a80983ac0d3a079f5e53f0a9bca41bda6a8f0a558812034efd54e522278e4de3d66f22de0b94f87466d67e416d80d7955b17a48c05b95b8a60e7883e06c9b2311e26fce6bae49a48e959b21eeca4f0401e44e532d0caab1980678f7449c830c44de14b70b", 0xba}, {&(0x7f0000000580)="6065f4dce786fce70619353b1bf8efa01947e9a4ae5bc69326ecb602127fb80d5d4c3e83514fe829da080f4263e9e7897c275a4f9d4ee94d31972a2b3a5357165f9dde63ea4f421171b4dc265f00e1a96d4cd71d56c606124db5ca9205c6f83c8e4bec5411c9b1ef", 0x68}, {&(0x7f0000001cc0)="9a65a8259243c69b307b942c5419a4bf85203ccaa6c5efe699a37d170ac3d25408ac7da493034e328b7077531ebdf07e4962961dcf7c626869bc22b86a23ee3906e86a22124556b02fdebdd111ffe546b780011b9e53edf8b7404c4d15b8f9573055cd54eb89b1bbfac0389125c6181fc4cee031df8e8a7bee05ffb0a19e5a69abef6422940c8213", 0x88}], 0x5, &(0x7f0000002d00)=[{0xc0, 0x104, 0x3, "1e9e7ca02b46393e21daca0ba7dd504e96ec703cc9602e509711c35ba00fff3d04c035c557056e7c46a34677083e8ed4ff14a923e41a1cda9a7c51be97c850c37f452333b1093df7204ee26decf7372334d974c489353145d7170bea202bb4ba9ac3a10ecac733bfbc2b58863fb7c33cf3b1f927bc956f53bd9cea3498d9f9025832e20af9f8c13c606e4ad484c16ade9ab8a998a8c19db0fb53bffae607ecbaf2536dec8f9ffbd396186be0"}, {0x90, 0x11f, 0xffff, "8c8a2d0940d7b0fce2ddb19caed9f5a1eb222ffbeeb10b2e24e84e0200978697a26f2ea82c568c3005986d0ba62bbbc33db1617513787d35783106e4a8db01e5af37c30e0267532311cbc02a0059f8a08b7ecfe00d73cbf24ebf1d1d5e41bd3988979fd5dd59d721df383bc9edc33ea3606a94f5abceae49377209"}, {0x90, 0x0, 0x0, "8ea94444d2e46bde9b60a012c5d4fb75174c9c2bf6a5c004642df724f8719f849ace50ab1032194cf14d4606191a55d4e1ac45bc258ec7e6a9e25b98be6fd19a3fef7d790b7e982ec5ab2c9781c0837e7f8c32a747e20f6ef899750fd819813d37960d83f704af22b02fe65ae6e896283f2a8b4255a60e204c"}, {0x1010, 0x117, 0x3, "8665525ca0e79363752aa11ecef4a47152452937f7555c34f9326b91e71fe2875488452eac20560944043c35737ddab8c7048324565d89ef8d51e10d2dc3de7c34a0ede255f41dafc36c08c27d1abf314510f522caa671b8d9f9bc29d2bcd9c5b31840637717758f978b8d74205190d71910b205ff54e9b1921ed440f81f7099d3aef9d810640803751a6808fa5a8ca81f45c3403e1ce696939dc071f299f2b778e36435c79bcf70d5d57446078cf4d797b0da60c92a104ced5505561f150aa6034b2ba1d56a2c20ea9927926ee54363d39795e61814808443f5e84440c9a2b33e3be43f025e5165856c46fb4d5ab1fb2042b53ddcc72d9b50110fa18259ca4ef5537614623979d222b5a9973c145c160f1bd4a6193cd2c8fb4e24a37601d6af6a4a076698659f31b9bb9d492ba0c97a301626f62affe051ef4bf1f628c7ebc747660057bb6ec96a83de78b5b193f43205df51a8ed1e049f2a50f635cbbef16f2e28eea6bf797f6759c51beb24c06ee4f3d7018e6578aefb2639fbbb1c4ca81d081fa82010a57fa475d0cf36b50c97eece4bdfffbcb93f0ae925522c16fcc1e0cc3010836a3e75de361e1b9052000dbdaac6a2825325dc8ca95e6c141be5e5ccf877e8152ab6ee4ef04ebf9a4ccae4b8ef3abd35412df1e2665e86ff0bfc8e88a8a67c01c5b375209608cae3ba57163ede35e1a543678b48897edee680e72901a73075ce89cd1473a26a2b657664050f0a1ae13efa0b1bd46be0247a317c04da8f1a996cd5dfe8ff607c0fa722f68d0856b22d16d590fe144091d41e876337d6fd271ad618db2fc6acd633871f68f1770a9c0c0e780751c750df27dc189fe67a98583cf190818279cacc6ec429702f43b45760e6fb1bad7999c557030b0648c26d3906adafbc81f300626f6e39f6046f218b43fe7d9a950cf557ddfcf99489cc8ebc2e35f4da680376f1e7cf46d52e07f0c153db29dcf64fd8f248ee4d2bc5c1d6ea291a99c8b5741836d28d66acbdffdcaa7de76a1368806dc58eb8babd64b866e913ce99493067fdcf66805998a5aecd6be6ba1dab4908bd577abc7dac0f8e21436aa84112d7601dfec4e67274bec0b281903ef99a1a02c9a8c14a7a800a095b36bcb7a8272c066e9273935f75dfd7712401b18155642cf448c14f71c4a9cc443bf12f7426f58481878d2279395f5719b364f69d467680d7bb77b6e0e9b6e7ca80b16f48f1da747dfa7664f075b5f5966cfe562e62497dc8ef70e5c5001f9a8ebbbef84b9b4d6634360f83a3d48178d9943031ad8f0e703ef159983624bd4cd622e2ff6d470519ea6e0d8e90eec78eace0651c53f97a93546d27b38e37455d30df671254a9435014f4dd6caebc10b999d7798f9248c3dbad13f2eeda0ec9c51f85ca8d8de9b7de503dfb44c452ab330446e8cf87d954198d4ffb7d7d1b7871dedeef51f9928a8027d9e8ccbd8b6aba54c4c6bdce1d9f80bf8a13e0cb5840b6379a97baf5e7e90b5089430d155f38fa43196bfde49a099264f5927f90eefd887eed25c665f675fb34be2c7ba78703880225e13597006f7f025f6e0d0aa23a06878e81eec4b2ba19eb0320ed1ae6f9c101acbeac7a64c64555a275a8e0f44f45102fd9d3361661a9fad79793db5309754dbbd293884ab08ef7095596e6dbaa7f9ff36a480cdd56ba4672797900279bc7e9e3315a06bf0f56f8124a252e77695fe6e8d1f59dd573445fc2325123bd7af9b590c5622e0222dc156bf7e973f67f7ef39f84284c143cc43e1d812be5df7eeb516384482822f5ad352e39f5d84d1f3aef327cddaaefddcb0b741f4152ac23693231b9192df0e163726fc736f8834c40a57ede60858391b7b791177a8c88581d61b48201cd5e6856d1df41fdcb7a179fe456e7054715020761ca76ec18359dcbf364a84372aeff3252af7baa28b71525cc6cce22486f618c7dc646e082c962ed8818cd7a89dfb483c1ac4e9b6d25ef55f7be6367d3a76a34d8c935d51dc0ccc06a11e05a299a4356f2bc26085784204db13feb47b97ecf3115852cced04532c43204ea078f835e2d75be295a63b60e66489a52794ce0338c506e763a9be46dffcce53f0058e6533b34d0a7f851435808b5738911fe7b68571325ee9bbdf46e581223d132b85a857bb598b5b84fa32b540e3362f1902d3be01b42bdcae49fdccb1a554ecfd6248331393227ad789809544999440dc27140f65750dc75f2083de5171e0d71a9495f3fcaa980f288564e77a22c4210eb853cb893cc23065076ad1be6cd266fdf9b2e8f565c47f30890a67ba9e3b5a1d5fc2e260b3b7b3835927169e9922a9c40e8f0201791a71139c3809a8720d3c26272eb050c04ba64faa620336e63bb4802dd39cf296a48c5c31b484aae90d746519e9578141f38ce8f5a0d22739274824728fdd191839237710a4cba53b4f2aeba499c493196ac43405d7810130747cddd1226892ec517562fea297d2fa5b97517ba904e13cb63834b5ab9a5c48706125cae09606169bcd57668740e4c7d6cde0f0e14cced2f12b6dfeb6b14373f8e68b19f8433f36568eb424dffc3b4ec4beca54969e3f46b834b6bf392bee50efc720fe54e56614e39506c718731859c475a86e50d9d5d4cd466d107429fdb26756b32e03271e7cdc2fc546fb19d4e62aad05fbc673a03759e9a9f2bfad8ad63fce392b760a196d37173bc81d217e8c8f3b020d2a0a7b22e0b339a91e0e24f0a21a120cac9bce44e0285de1246048a5668025d04e49b99a05760fa61e63caf57d349f450d1e82790c96085a57fd98f41b5bcf2a9b57b98d7641401d3f8d4d3202e7c8e6ecc5ef67f3219692fb26fce766f1b744846ff52649a3417fcab938f1000e2105a11820b3ad3bb086ca86ae5afcfc0902be01fe58e388c1aa92ca6123685fc626d3c8a8a1789756cee51b3af8ab8db49e52cd4a269a003d0af4dcba8f3eca4d2f9859db39c63d48ec3fb47316e20faee783d617c50e9f645daca9a5456ce00b40b60c33613042409fc5c50d33d1805996ec14db4a498a69c303bccf29c3280f5e2eea06c2b221633a97f4372f171bf54d2adb7f17348647cf967ea35f5399cf97f126a5033209489e909830e921a0c275d835d89075452fc8c2d2cd1b0c5489e8c933bf8e1945ff1a1dc901f64f8a8462377dd23a2c9fef3f70f696bb9def5a4e2cacc0c3fe99ed7816e7ff4a7e391ee7974d962b0e32cc0896321d28abe71f8ad17706a9a295e4f5f47592366565181a5d225a143086316158f1cfd593216e88dfc71a378c5a99766637f5b05e53f45ffb76e21375bcad2e5ff64bbf65796ed706e5b9ab9c0d0eefa2d7c706169035e63489868171faf2f4769bfcf37807ca9f7d99ecb38265f5fb9e81617c135de0fc9d74ef348c9e4107411938f62a6c9a51da2b4b31d90dbf49bf3efb83e88d8ca5ec5e20bef778e09c56765526f6480a5a2290f052bc3b4d6042aec867d4fbf81071d6fb72499f29bcc88e4aa84fd4ded59cf6a2b4b03a9c2ae297c8f7b81250405c697b0967c348beb7a8af31c488a60a6c50eb095168580c60ef7315f6afec744897cfb1872832fb864bd8a1649045bb83558276436c23f068ded773b8c1b76dd49b111c1fb24bf369cf6b1f7b04ba2538ef9b66ba48d0895ee1f5eb21624c09e099549088dc67d8f3b37a08a8173ae125daded5350c4fa8554cedb2a12cbdf346fc0bf35eed7cc998ebc8c7144795d6fe553d23cd2271cd8b24e6f9ef811a78917bf2c03c441088b60fb4d9cbd974c4c5462657cbd36d36228c11e483defaed1f1441e5421608b41669ce3a5e25bd24ffb797f6fc40552050c98d3726a52f9e204a560ef22098fa09e7f43557d04cbe2cb5382bc49a2eef81c5c22c28996bbafa7840fc4f29fdafd7a1c18c2fc7707f3a632c2d3acafdd0a2eec7c64db9c5d0d5eb782f9f9927fe7b043ed6bfb637ed9afdaaf1cacfc6c393b7250a4237061df15bf607cb6324e6d335f9e3d832aa709184193a520ecc59cc6bb5ba9a0f76e1a30b19c7f69988418ff59d83ca7ba078a6b16d432a66548eb0f30de831b6fed22ebbf5dd180114d5da727589a9c0a79f7a5da5be9943d3714f3b123e3c2c51e30958797dba0e83cabf4afa8a1b5e19fa4fabb37f2ac5ca76c0bbb0032dc039603ba7599c046901bd3c7e3b875df2b601d2d8cfede250f5ab8bed7fe4ca941bf1ae864919e1ef44dbcc5dcd054ee134ad280cfde864f81c278b7b54178348ccda330be9c4ca15917008bacbfc88c2eb35d645ba19f9fe63bcded335aa19ac6d5cdd6b1223961b6754470805ce0e5803e871d63e246aecf97aad337c13d2a7d6b9c4967ff480e48c9f51ee5f64df210c9304a410a642579e077e9c2db1f6288306ea1c9d710d9abd84027bad8a334009e3429e147b204ea5e930f30b8433b6fff9107672e47b6d61daca9994628877728227b13239493bf17db4a1e62e5b613e8c2a8b69b570e5474d30aa4a9d42e6518ad294bf23b68a97e2aca5261bec5757fa83944c3c4b829ebe3a4ab4581a68a15f3b1a7c9ea8440166fa1a20eca41be5fd0ddedc2ecb5f1a8e8754b4842c506b0a56ebba164c63accff0b347ac866969c6192add2a3c7570c23730452ff0f80d82205953b5a8275bb3fc1aaf5fcb83a00a5a282afc3ff2a28a16ad0d83dfd6d16d1475521e63fb4bc82dc43f2c633df63432c7d53044f3d70352a168d3e41f65f36f0cc2448ebfd40e65240a880e3adc071b45905fd03ff775b940285d7966a7cd6a0649c84c0b6b6062da31fb340920efcebabda404584d10fd6fc9bb4a7ba48af6bb683db442310591ff93e6998e8563de1db8fdac6e12c4a3ae85ce60f5e1d00043c5bbc44d4f13a8e664e49cc9d7f495ec5ca5cd4edc17d84a38f0979cdffebbe0d77692a0015fa13832e60f193ad01b20f7949fbd29ebd97fa3dabd5bbb504aa39d6562aec069c9a992e0b08e436462c0596414c02e6c0afb3d630a9053a971dc99f7fff6fc418de74362e02a58492979f5681eb9d4882237a1fd42718572d32a160d4d25ae3e679681d817ebc87fe36d8f340da8d70825ead98e1d97db2e3120a04a28612b627eb6b8ec1cb0f998ff58c18c6a202fecc92110934ae970a24cc56f8a4e33ecd648eefa4209e6c385288c29efe3b35fa2686898305347e192b60cef18810dc2ea547973ac631125691176aff92230d192e3e1647307a6219a07eec3fb553a759160d1508bf6f40ccbec9db4c35681c1418f5660983496ad1a82aa678cf473280d1ad3de6ca78795e0652ed552e3f47adbf9459abb5d819b52815d6a30d0913ade8dcfadff3bebd7e5ebb4690e4aa9fbf1040436d5c71209160921f41ffeacb2db01310719ca529ad74dbe08e58a9ea5268c324f6dcb91899353a6089dbc2010dea253244619387e9351af48e15c67b425931c2aae2882f62f5b9d73cb97aa78c7bb7d975fe7875df4491e5aeccf993352a2b3d6b9e42a4319e2530e69a3b5e42c076880ec16faf3cada67c19f8cf0be03735662ca18db53e7fa7aaa9ddb3f7b7d76a794fb6e497c246a9b3d340c6801158bcd4d67bbc9149465e3bb3eb8f64f46b6fe7962bdd3ad3cdf984ea43b5ca02ed1893ed9f2aeb176c22665f0ceb1e2241bb141a49155766bd5404e6bd53194257cd49f28d85c028c9bdd5c89a5150a0ccb9d3c3439e2e579703a4b16aee355ee8d139e0ef52dcbe829a1702d4b99cd94e778e8c3afaf16af0265c7c15ecab49b254a219eb69a5146c82534ab859bee566ecf2"}], 0x11f0, 0x8000}, 0x801) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) socketpair$inet(0x2, 0x7, 0x101, &(0x7f0000001d80)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 898.753308] FAULT_INJECTION: forcing a failure. [ 898.753308] name failslab, interval 1, probability 0, space 0, times 0 [ 898.764625] CPU: 0 PID: 27001 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 898.771777] FAULT_INJECTION: forcing a failure. [ 898.771777] name failslab, interval 1, probability 0, space 0, times 0 [ 898.771902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 898.792411] Call Trace: [ 898.794996] dump_stack+0x194/0x24d [ 898.798610] ? arch_local_irq_restore+0x53/0x53 [ 898.803260] ? mutex_lock_io_nested+0x1900/0x1900 [ 898.808083] ? __memcg_init_list_lru_node+0x169/0x270 [ 898.813258] should_fail+0x8c0/0xa40 [ 898.816954] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 898.822043] ? trace_hardirqs_off+0x10/0x10 [ 898.826347] ? lock_downgrade+0x980/0x980 [ 898.830477] ? trace_hardirqs_off+0x10/0x10 [ 898.834780] ? find_held_lock+0x35/0x1d0 [ 898.838842] ? __lock_is_held+0xb6/0x140 [ 898.842895] ? check_same_owner+0x320/0x320 [ 898.847197] ? rcu_note_context_switch+0x710/0x710 [ 898.852691] ? rcu_note_context_switch+0x710/0x710 [ 898.857610] should_failslab+0xec/0x120 [ 898.861568] __kmalloc+0x63/0x760 [ 898.865003] ? __kmalloc_node+0x47/0x70 [ 898.868964] ? __list_lru_init+0xcf/0x750 [ 898.873096] __list_lru_init+0xcf/0x750 [ 898.877054] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 898.882920] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 898.887920] ? lockdep_init_map+0x9/0x10 [ 898.891963] sget_userns+0x6b1/0xe40 [ 898.895662] ? set_anon_super+0x20/0x20 [ 898.899621] ? put_filp+0x90/0x90 [ 898.903057] ? destroy_unused_super.part.6+0xd0/0xd0 [ 898.908139] ? alloc_vfsmnt+0x762/0x9c0 [ 898.912093] ? path_lookupat+0x238/0xba0 [ 898.916134] ? mnt_free_id.isra.21+0x50/0x50 [ 898.920526] ? trace_hardirqs_off+0x10/0x10 [ 898.924828] ? putname+0xee/0x130 [ 898.928265] ? cap_capable+0x1b5/0x230 [ 898.932134] ? security_capable+0x8e/0xc0 [ 898.936266] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 898.941437] ? ns_capable_common+0xcf/0x160 [ 898.945743] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 898.950911] mount_ns+0x6d/0x190 [ 898.954258] rpc_mount+0x9e/0xd0 [ 898.957606] mount_fs+0x66/0x2d0 [ 898.960954] vfs_kern_mount.part.26+0xc6/0x4a0 [ 898.965520] ? may_umount+0xa0/0xa0 [ 898.969130] ? _raw_read_unlock+0x22/0x30 [ 898.973258] ? __get_fs_type+0x8a/0xc0 [ 898.977131] do_mount+0xea4/0x2bb0 [ 898.980654] ? __might_fault+0x110/0x1d0 [ 898.984701] ? copy_mount_string+0x40/0x40 [ 898.988914] ? check_same_owner+0x320/0x320 [ 898.993216] ? __check_object_size+0x8b/0x530 [ 898.997700] ? __might_sleep+0x95/0x190 [ 899.001664] ? kasan_check_write+0x14/0x20 [ 899.005880] ? _copy_from_user+0x99/0x110 [ 899.010011] ? memdup_user+0x5e/0x90 [ 899.013705] ? copy_mount_options+0x1f7/0x2e0 [ 899.018182] SyS_mount+0xab/0x120 [ 899.021615] ? copy_mnt_ns+0xb30/0xb30 [ 899.025486] do_syscall_64+0x281/0x940 [ 899.029355] ? vmalloc_sync_all+0x30/0x30 [ 899.033484] ? _raw_spin_unlock_irq+0x27/0x70 [ 899.037959] ? finish_task_switch+0x1c1/0x7e0 [ 899.042438] ? syscall_return_slowpath+0x550/0x550 [ 899.047347] ? syscall_return_slowpath+0x2ac/0x550 [ 899.052261] ? prepare_exit_to_usermode+0x350/0x350 [ 899.057256] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 899.062606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 899.067436] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 899.072607] RIP: 0033:0x454e79 [ 899.075776] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.083468] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 899.090718] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 899.097970] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 899.105223] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 899.112474] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 899.119743] CPU: 1 PID: 27010 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 899.127012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.136363] Call Trace: [ 899.138953] dump_stack+0x194/0x24d [ 899.142574] ? arch_local_irq_restore+0x53/0x53 [ 899.147222] ? __save_stack_trace+0x7e/0xd0 [ 899.151525] should_fail+0x8c0/0xa40 [ 899.155224] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 899.160315] ? kasan_kmalloc+0xad/0xe0 [ 899.164180] ? kmem_cache_alloc_trace+0x136/0x740 [ 899.168998] ? __memcg_init_list_lru_node+0x169/0x270 [ 899.174166] ? __list_lru_init+0x544/0x750 [ 899.178381] ? sget_userns+0x6b1/0xe40 [ 899.182258] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 899.187010] ? do_mount+0xea4/0x2bb0 [ 899.190711] ? SyS_mount+0xab/0x120 [ 899.194324] ? do_syscall_64+0x281/0x940 [ 899.198366] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 899.203720] ? find_held_lock+0x35/0x1d0 [ 899.207766] ? __lock_is_held+0xb6/0x140 [ 899.211807] ? check_same_owner+0x320/0x320 [ 899.216112] ? rcu_note_context_switch+0x710/0x710 [ 899.221037] should_failslab+0xec/0x120 [ 899.224989] kmem_cache_alloc_trace+0x4b/0x740 [ 899.229552] ? __kmalloc_node+0x33/0x70 [ 899.233505] ? __kmalloc_node+0x33/0x70 [ 899.237464] ? rcu_read_lock_sched_held+0x108/0x120 [ 899.242473] __memcg_init_list_lru_node+0x169/0x270 [ 899.247474] ? list_lru_add+0x7c0/0x7c0 [ 899.251422] ? __kmalloc_node+0x47/0x70 [ 899.255379] __list_lru_init+0x544/0x750 [ 899.259424] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 899.265289] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 899.270297] ? lockdep_init_map+0x9/0x10 [ 899.274344] sget_userns+0x6b1/0xe40 [ 899.278049] ? set_anon_super+0x20/0x20 [ 899.282012] ? put_filp+0x90/0x90 [ 899.285451] ? destroy_unused_super.part.6+0xd0/0xd0 [ 899.290535] ? alloc_vfsmnt+0x762/0x9c0 [ 899.294487] ? path_lookupat+0x238/0xba0 [ 899.298539] ? mnt_free_id.isra.21+0x50/0x50 [ 899.302938] ? trace_hardirqs_off+0x10/0x10 [ 899.307249] ? putname+0xee/0x130 [ 899.310695] ? cap_capable+0x1b5/0x230 [ 899.314567] ? security_capable+0x8e/0xc0 [ 899.318697] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 899.323868] ? ns_capable_common+0xcf/0x160 [ 899.328180] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 899.333361] mount_ns+0x6d/0x190 [ 899.336719] rpc_mount+0x9e/0xd0 [ 899.340066] mount_fs+0x66/0x2d0 [ 899.343412] vfs_kern_mount.part.26+0xc6/0x4a0 [ 899.347979] ? may_umount+0xa0/0xa0 [ 899.351597] ? _raw_read_unlock+0x22/0x30 [ 899.355727] ? __get_fs_type+0x8a/0xc0 [ 899.359606] do_mount+0xea4/0x2bb0 [ 899.363141] ? __might_fault+0x110/0x1d0 [ 899.367194] ? copy_mount_string+0x40/0x40 [ 899.371419] ? check_same_owner+0x320/0x320 [ 899.375728] ? __check_object_size+0x8b/0x530 [ 899.380217] ? __might_sleep+0x95/0x190 [ 899.384180] ? kasan_check_write+0x14/0x20 [ 899.388395] ? _copy_from_user+0x99/0x110 [ 899.392527] ? memdup_user+0x5e/0x90 [ 899.396236] ? copy_mount_options+0x1f7/0x2e0 [ 899.400724] SyS_mount+0xab/0x120 [ 899.404168] ? copy_mnt_ns+0xb30/0xb30 [ 899.408040] do_syscall_64+0x281/0x940 [ 899.411903] ? vmalloc_sync_all+0x30/0x30 [ 899.416039] ? _raw_spin_unlock_irq+0x27/0x70 [ 899.420537] ? finish_task_switch+0x1c1/0x7e0 [ 899.425020] ? syscall_return_slowpath+0x550/0x550 [ 899.429929] ? syscall_return_slowpath+0x2ac/0x550 [ 899.434831] ? prepare_exit_to_usermode+0x350/0x350 [ 899.439820] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 899.445161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 899.449979] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/30 19:01:48 executing program 3 (fault-call:17 fault-nth:20): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:48 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 899.455151] RIP: 0033:0x454e79 [ 899.458322] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.466007] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 899.473266] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 899.480519] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 899.487771] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 899.495026] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/30 19:01:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:48 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x0, 0x80803, 0x400000, &(0x7f0000000000)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) [ 899.587390] FAULT_INJECTION: forcing a failure. [ 899.587390] name failslab, interval 1, probability 0, space 0, times 0 [ 899.598694] CPU: 1 PID: 27017 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 899.605969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.615321] Call Trace: [ 899.617921] dump_stack+0x194/0x24d [ 899.621556] ? arch_local_irq_restore+0x53/0x53 [ 899.626224] ? mutex_lock_io_nested+0x1900/0x1900 [ 899.631070] ? __memcg_init_list_lru_node+0x169/0x270 2018/03/30 19:01:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0", 0xa2}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:48 executing program 7 (fault-call:15 fault-nth:26): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xffffffffffffffb4) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) sendmsg(r5, &(0x7f0000000700)={&(0x7f0000000500)=@ax25={0x3, {"8d091f03b20cfc"}, 0x2}, 0x80, &(0x7f0000000280)=[{&(0x7f00000009c0)="149e626c6d44c637c83e7bb2d23884e1663a965c35dac7dc6f4e0751ec52b3f25aa052e8ab5e15b374589bea836a237a1684025b2834967bd451ae5559537da7fdc44b96a18b55203ed2760155ee8e31877d781b45c2e85ea024f229cd82822f90ddbcb38c0b623da02fc0659b42e645a9ca3e194fc82f83c78b458df69a82be89ef080f24a0db524033bd67eca76b7edfe200033da5b7ced684435a0511484c6cfed9f84f2f1e9a885de7", 0xab}, {&(0x7f0000000580)="f0cdb4cfb58111d6a4cb9a94969e2cc3476d7cf7f03a6d9264c7ac6659d7818900067e7ac097a85d01268e2f22e7c1b3985b499c9fc4569dd79aa747daffd6f557c1de582060bd3fd3582007ae3c4e0355ea127b4ca129af48b127e8dc9d890d988e276f38953f2586ddfc", 0x6b}, {&(0x7f0000000200)="c75674d3466e06997ef7efbdc3fcf763dc1d1868950c241c4b3570dac00b6d4b9555652bf79f31f0fa", 0x29}], 0x3, &(0x7f0000000c00)=[{0x100, 0x3a, 0x1, "88a7d33a2fe9d945bcf4466fb9113db3314ea70f8b3a8af4ff95051c3eebf8d963ba64f7095e404149e2e44ad89e1893fabeb02319f5fee78a762d7a5e865477acda7b5ec583cbb5e921b07ce6a9f7509bd7eec6792be1777985c85a6e860fd0143664ffeb78233a468bbdefbdf43889130e6fe4cfca272d0b88ee997d5b7fdc8ac54a40e2c8f2528d90693b2271d3daa1d2374d83da468b59be92d4d351b0e8f7431ad57fb3a879951c425fdcd48f91311055e6ad9ab7303d4946642a513baf9e9c661e668c92545c1ea93b2755e2cc7ef51361be7caf8ca1294126d34d04d593eb53697798133849566be9"}, {0x110, 0x11e, 0x8, "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"}, {0xb8, 0x118, 0x80000001, "ede1c3d8935e422ad1555057fe430c6873fcd80f8070e8a862b6ad92ed86c72c45443507d5db74cd240b9ceeaff918955f90309b3006355b7ed74ec9d1c0298693d2b8f0daa6ec518f7e616209d0d5998701db3e003db451df3e6f7019c8551fa36278f1e4ceb0ceadcb151c97ae38bbefc8d32932dfa16cb3ed60dc35e8a67d166c4d649c1d7ff3b9ce695d31931c6deb30dc7fdff2a4fc061ecdde4c72bb7beaa2dc"}, {0x60, 0x109, 0xfffffffffffffffc, "abd09b5eb51547472e643238f984238ab15d3ea9772e99632e6cf1092a52d00c371ee3d1d86bb5e595a11eb14a0cb86b5c4010ca236e77d56f6a7f4c7eea6afe9af3908bf7ba824539"}, {0x18, 0x10e, 0x5, "09cb698d"}], 0x340, 0x10}, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x0, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 899.636268] should_fail+0x8c0/0xa40 [ 899.639982] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 899.645086] ? trace_hardirqs_off+0x10/0x10 [ 899.649397] ? lock_downgrade+0x980/0x980 [ 899.653523] ? trace_hardirqs_off+0x10/0x10 [ 899.657831] ? find_held_lock+0x35/0x1d0 [ 899.661876] ? __lock_is_held+0xb6/0x140 [ 899.665936] ? check_same_owner+0x320/0x320 [ 899.670259] ? rcu_note_context_switch+0x710/0x710 [ 899.675189] ? rcu_note_context_switch+0x710/0x710 [ 899.680118] should_failslab+0xec/0x120 [ 899.684101] __kmalloc+0x63/0x760 [ 899.687535] ? __kmalloc_node+0x47/0x70 [ 899.691485] ? __list_lru_init+0xcf/0x750 [ 899.695609] __list_lru_init+0xcf/0x750 [ 899.699565] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 899.705430] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 899.710427] ? lockdep_init_map+0x9/0x10 [ 899.714462] sget_userns+0x6b1/0xe40 [ 899.718169] ? set_anon_super+0x20/0x20 [ 899.722120] ? put_filp+0x90/0x90 [ 899.725553] ? destroy_unused_super.part.6+0xd0/0xd0 [ 899.730644] ? alloc_vfsmnt+0x762/0x9c0 [ 899.734602] ? path_lookupat+0x238/0xba0 [ 899.738641] ? mnt_free_id.isra.21+0x50/0x50 [ 899.743038] ? trace_hardirqs_off+0x10/0x10 [ 899.747344] ? putname+0xee/0x130 [ 899.750773] ? cap_capable+0x1b5/0x230 [ 899.754641] ? security_capable+0x8e/0xc0 [ 899.758763] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 899.763929] ? ns_capable_common+0xcf/0x160 [ 899.768228] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 899.773391] mount_ns+0x6d/0x190 [ 899.776732] rpc_mount+0x9e/0xd0 [ 899.780169] mount_fs+0x66/0x2d0 [ 899.783528] vfs_kern_mount.part.26+0xc6/0x4a0 [ 899.788100] ? may_umount+0xa0/0xa0 [ 899.791703] ? _raw_read_unlock+0x22/0x30 [ 899.795828] ? __get_fs_type+0x8a/0xc0 [ 899.799695] do_mount+0xea4/0x2bb0 [ 899.803222] ? __might_fault+0x110/0x1d0 [ 899.807266] ? copy_mount_string+0x40/0x40 [ 899.811476] ? check_same_owner+0x320/0x320 [ 899.815773] ? __check_object_size+0x8b/0x530 [ 899.820244] ? __might_sleep+0x95/0x190 [ 899.824205] ? kasan_check_write+0x14/0x20 [ 899.828431] ? _copy_from_user+0x99/0x110 [ 899.832566] ? memdup_user+0x5e/0x90 [ 899.836254] ? copy_mount_options+0x1f7/0x2e0 [ 899.840728] SyS_mount+0xab/0x120 [ 899.844156] ? copy_mnt_ns+0xb30/0xb30 [ 899.848024] do_syscall_64+0x281/0x940 [ 899.851890] ? vmalloc_sync_all+0x30/0x30 [ 899.856021] ? _raw_spin_unlock_irq+0x27/0x70 [ 899.860499] ? finish_task_switch+0x1c1/0x7e0 [ 899.864969] ? syscall_return_slowpath+0x550/0x550 [ 899.869873] ? syscall_return_slowpath+0x2ac/0x550 [ 899.874777] ? prepare_exit_to_usermode+0x350/0x350 [ 899.879773] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 899.885135] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 899.890046] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 899.895212] RIP: 0033:0x454e79 [ 899.898378] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 899.906061] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 899.913313] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 899.920576] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 899.927822] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 899.935070] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 899.998306] FAULT_INJECTION: forcing a failure. [ 899.998306] name failslab, interval 1, probability 0, space 0, times 0 [ 900.009599] CPU: 1 PID: 27032 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 900.016877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.026231] Call Trace: [ 900.028832] dump_stack+0x194/0x24d [ 900.032471] ? arch_local_irq_restore+0x53/0x53 [ 900.037149] ? __save_stack_trace+0x7e/0xd0 [ 900.041479] should_fail+0x8c0/0xa40 [ 900.045198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 900.050299] ? kasan_kmalloc+0xad/0xe0 [ 900.054170] ? kmem_cache_alloc_trace+0x136/0x740 [ 900.058995] ? __memcg_init_list_lru_node+0x169/0x270 [ 900.064172] ? __list_lru_init+0x544/0x750 [ 900.068384] ? sget_userns+0x6b1/0xe40 [ 900.072250] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 900.076995] ? do_mount+0xea4/0x2bb0 [ 900.080694] ? SyS_mount+0xab/0x120 [ 900.084301] ? do_syscall_64+0x281/0x940 [ 900.088354] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 900.093706] ? find_held_lock+0x35/0x1d0 [ 900.097758] ? __lock_is_held+0xb6/0x140 [ 900.101813] ? check_same_owner+0x320/0x320 [ 900.106132] ? rcu_note_context_switch+0x710/0x710 [ 900.111051] should_failslab+0xec/0x120 [ 900.115009] kmem_cache_alloc_trace+0x4b/0x740 [ 900.119577] ? __kmalloc_node+0x33/0x70 [ 900.123528] ? __kmalloc_node+0x33/0x70 [ 900.127481] ? rcu_read_lock_sched_held+0x108/0x120 [ 900.132478] __memcg_init_list_lru_node+0x169/0x270 [ 900.137479] ? list_lru_add+0x7c0/0x7c0 [ 900.141453] ? __kmalloc_node+0x47/0x70 [ 900.145431] __list_lru_init+0x544/0x750 [ 900.149484] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 900.155360] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 900.160366] ? lockdep_init_map+0x9/0x10 [ 900.164412] sget_userns+0x6b1/0xe40 [ 900.168105] ? set_anon_super+0x20/0x20 [ 900.172066] ? put_filp+0x90/0x90 [ 900.175495] ? destroy_unused_super.part.6+0xd0/0xd0 [ 900.180585] ? alloc_vfsmnt+0x762/0x9c0 [ 900.184551] ? path_lookupat+0x238/0xba0 [ 900.188605] ? mnt_free_id.isra.21+0x50/0x50 [ 900.193011] ? trace_hardirqs_off+0x10/0x10 [ 900.197328] ? putname+0xee/0x130 [ 900.200777] ? cap_capable+0x1b5/0x230 [ 900.204652] ? security_capable+0x8e/0xc0 [ 900.208780] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 900.213952] ? ns_capable_common+0xcf/0x160 [ 900.218261] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 900.223433] mount_ns+0x6d/0x190 [ 900.226777] rpc_mount+0x9e/0xd0 [ 900.230129] mount_fs+0x66/0x2d0 [ 900.233481] vfs_kern_mount.part.26+0xc6/0x4a0 [ 900.238045] ? may_umount+0xa0/0xa0 [ 900.241657] ? _raw_read_unlock+0x22/0x30 [ 900.245788] ? __get_fs_type+0x8a/0xc0 [ 900.249658] do_mount+0xea4/0x2bb0 [ 900.253173] ? __might_fault+0x110/0x1d0 [ 900.257209] ? copy_mount_string+0x40/0x40 [ 900.261416] ? check_same_owner+0x320/0x320 [ 900.265715] ? __check_object_size+0x8b/0x530 [ 900.270196] ? __might_sleep+0x95/0x190 [ 900.274149] ? kasan_check_write+0x14/0x20 [ 900.278362] ? _copy_from_user+0x99/0x110 [ 900.282500] ? memdup_user+0x5e/0x90 [ 900.286195] ? copy_mount_options+0x1f7/0x2e0 [ 900.290670] SyS_mount+0xab/0x120 [ 900.294107] ? copy_mnt_ns+0xb30/0xb30 [ 900.297972] do_syscall_64+0x281/0x940 [ 900.301835] ? vmalloc_sync_all+0x30/0x30 [ 900.305963] ? _raw_spin_unlock_irq+0x27/0x70 [ 900.310443] ? finish_task_switch+0x1c1/0x7e0 [ 900.314912] ? syscall_return_slowpath+0x550/0x550 [ 900.319819] ? syscall_return_slowpath+0x2ac/0x550 [ 900.324723] ? prepare_exit_to_usermode+0x350/0x350 [ 900.329716] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 900.335061] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 900.339882] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 900.345049] RIP: 0033:0x454e79 [ 900.348216] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 900.355908] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 900.363159] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 900.370410] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 900.377665] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 900.384909] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a 2018/03/30 19:01:49 executing program 3 (fault-call:17 fault-nth:21): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:49 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:49 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:49 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000340)={r0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007000)={&(0x7f0000006d40)=@hci={0x0, 0x0}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006dc0)=""/197, 0xc5}], 0x1, &(0x7f0000006f00)=""/205, 0xcd}, 0x0) sendmsg$kcm(r1, &(0x7f0000007380)={&(0x7f0000007040)=@can={0x1d, r2}, 0x80, &(0x7f00000070c0), 0x0, &(0x7f0000007100)=[{0x18, 0x1ff, 0x10001, "027e"}, {0x28, 0x117, 0x7, "50b5b243540b42a0b70b5f904f2b314fdc8be5981742"}, {0xf8, 0x13d, 0x9, "2b986a2c910cc551224102f01b887b7fffb5ed916f56e745e53e0c6de0c8e777daa85ed314bbb74e6951123932a8e241ab9ce58398e118a788774a9ed47e11c11fff67f6949fe5b180d719e0250da0162ba200e93d27a3cfee0e79c94391a1d81d0375d7de7be994c1aa68ac61962a7e026b96bd52c60fd64eab91e2493c687bb049c6293ca611ff2252567fd847640aa085c4e16efde0a3ad109ea06acf6765ab5aeeed2ed12dee770075576d70033303c10e8bfc64c87aaac5e831702889fa915abc2867a6c5a2e64b3c5d89d42471610115dc2ba76141002d87a2eb3d344eeab608ab6d"}, {0xd0, 0x13e, 0x2, "a7d7169e47d80d3f5d6280bdcf175a756837e8d125b0372f51c1c4ab2ac49b9051bc3223f702a907685839207862aab99b29f37bcf8ddab0ef8aa0223af60a59d73e2ba5906b9f9613750e60564a86b38b4548e6a744f004503a4b548696497156e97276473363bba82b46f088145635d426713f21f039c2397f4840941f895c15f8461dfb328c26a4c9cbd5be494331c1368c35d817e8d9347951ceefebfb17fcdfe01bcba05555eef49e221627252f8d9802ac2f76868a87158999"}, {0x58, 0x119, 0x101, "1a787018e7477f2c6d480d2800050639c13bfdbb8550576e84945e92ca3f358a7b5d2379a73482d580c3cfd5d9c98860059360627d2da70a5a37256bc759a4a76621"}], 0x260, 0x24000000}, 0x4004000) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000000)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0", 0xa2}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:49 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000500)="6d696e69780082471d6af37b8305a89f4994c82ebab37f56496b1345b675c5a4e881dfce671f6eeee75f1a34aafdfa57b9d7894e58ae38750b2c3bffbf278b6cde6e2a5147deb839827c84605c689ea1b5bd845c44e9a312e429e229a81b7cd13d49ad8ca4dd65ef25a9f84120325e34ce90697e95b91c2a954c094b7cdd67e2e53c917be47ec8e76721e0d86aae29ec52fc0f122edf0eee66d1a91c41bb15a5f17782110d4e618f5402a1954463e3b5", 0x1000, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:49 executing program 7 (fault-call:15 fault-nth:27): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 900.518331] FAULT_INJECTION: forcing a failure. [ 900.518331] name failslab, interval 1, probability 0, space 0, times 0 [ 900.522551] FAULT_INJECTION: forcing a failure. [ 900.522551] name failslab, interval 1, probability 0, space 0, times 0 [ 900.529658] CPU: 0 PID: 27062 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 900.548110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.557451] Call Trace: [ 900.560032] dump_stack+0x194/0x24d [ 900.563647] ? arch_local_irq_restore+0x53/0x53 [ 900.568299] ? __save_stack_trace+0x7e/0xd0 [ 900.572613] should_fail+0x8c0/0xa40 [ 900.576312] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 900.581405] ? kasan_kmalloc+0xad/0xe0 [ 900.585279] ? kmem_cache_alloc_trace+0x136/0x740 [ 900.590106] ? __memcg_init_list_lru_node+0x169/0x270 [ 900.595281] ? __list_lru_init+0x544/0x750 [ 900.599500] ? sget_userns+0x6b1/0xe40 [ 900.603377] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 900.608116] ? do_mount+0xea4/0x2bb0 [ 900.611813] ? SyS_mount+0xab/0x120 [ 900.615424] ? do_syscall_64+0x281/0x940 [ 900.619469] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 900.624819] ? find_held_lock+0x35/0x1d0 [ 900.628864] ? __lock_is_held+0xb6/0x140 [ 900.632918] ? check_same_owner+0x320/0x320 [ 900.637224] ? rcu_note_context_switch+0x710/0x710 [ 900.642139] should_failslab+0xec/0x120 [ 900.646101] kmem_cache_alloc_trace+0x4b/0x740 [ 900.650667] ? __kmalloc_node+0x33/0x70 [ 900.654626] ? __kmalloc_node+0x33/0x70 [ 900.658582] ? rcu_read_lock_sched_held+0x108/0x120 [ 900.663586] __memcg_init_list_lru_node+0x169/0x270 [ 900.668592] ? list_lru_add+0x7c0/0x7c0 [ 900.672552] ? __kmalloc_node+0x47/0x70 [ 900.676513] __list_lru_init+0x544/0x750 [ 900.680569] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 900.686451] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 900.691466] ? lockdep_init_map+0x9/0x10 [ 900.695513] sget_userns+0x6b1/0xe40 [ 900.699208] ? set_anon_super+0x20/0x20 [ 900.703168] ? put_filp+0x90/0x90 [ 900.706611] ? destroy_unused_super.part.6+0xd0/0xd0 [ 900.711697] ? alloc_vfsmnt+0x762/0x9c0 [ 900.715656] ? path_lookupat+0x238/0xba0 [ 900.719702] ? mnt_free_id.isra.21+0x50/0x50 [ 900.724092] ? trace_hardirqs_off+0x10/0x10 [ 900.728395] ? putname+0xee/0x130 [ 900.731835] ? cap_capable+0x1b5/0x230 [ 900.735708] ? security_capable+0x8e/0xc0 [ 900.739840] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 900.745013] ? ns_capable_common+0xcf/0x160 [ 900.749321] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 900.754494] mount_ns+0x6d/0x190 [ 900.757845] rpc_mount+0x9e/0xd0 [ 900.761199] mount_fs+0x66/0x2d0 [ 900.764549] vfs_kern_mount.part.26+0xc6/0x4a0 [ 900.769114] ? may_umount+0xa0/0xa0 [ 900.772725] ? _raw_read_unlock+0x22/0x30 [ 900.776855] ? __get_fs_type+0x8a/0xc0 [ 900.780727] do_mount+0xea4/0x2bb0 [ 900.784250] ? __might_fault+0x110/0x1d0 [ 900.788297] ? copy_mount_string+0x40/0x40 [ 900.792517] ? check_same_owner+0x320/0x320 [ 900.796822] ? __check_object_size+0x8b/0x530 [ 900.801330] ? __might_sleep+0x95/0x190 [ 900.805291] ? kasan_check_write+0x14/0x20 [ 900.809511] ? _copy_from_user+0x99/0x110 [ 900.813644] ? memdup_user+0x5e/0x90 [ 900.817339] ? copy_mount_options+0x1f7/0x2e0 [ 900.821817] SyS_mount+0xab/0x120 [ 900.825254] ? copy_mnt_ns+0xb30/0xb30 [ 900.829125] do_syscall_64+0x281/0x940 [ 900.832993] ? vmalloc_sync_all+0x30/0x30 [ 900.837122] ? _raw_spin_unlock_irq+0x27/0x70 [ 900.841606] ? finish_task_switch+0x1c1/0x7e0 [ 900.846089] ? syscall_return_slowpath+0x550/0x550 [ 900.851003] ? syscall_return_slowpath+0x2ac/0x550 [ 900.855918] ? prepare_exit_to_usermode+0x350/0x350 [ 900.860920] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 900.866268] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 900.871098] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 900.876270] RIP: 0033:0x454e79 [ 900.879444] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 900.887139] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 900.894479] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 900.901732] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 900.908984] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 900.916238] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 900.923507] CPU: 1 PID: 27054 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 900.930781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.940132] Call Trace: [ 900.942726] dump_stack+0x194/0x24d [ 900.946356] ? arch_local_irq_restore+0x53/0x53 [ 900.951023] ? kernel_text_address+0xd1/0xe0 [ 900.955430] ? __unwind_start+0x169/0x330 [ 900.959581] should_fail+0x8c0/0xa40 [ 900.963293] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 900.968392] ? save_stack+0x43/0xd0 [ 900.972008] ? kasan_kmalloc+0xad/0xe0 [ 900.975881] ? __kmalloc+0x162/0x760 [ 900.979571] ? __list_lru_init+0xcf/0x750 [ 900.983697] ? find_held_lock+0x35/0x1d0 [ 900.987747] ? __lock_is_held+0xb6/0x140 [ 900.991805] ? check_same_owner+0x320/0x320 [ 900.996124] ? rcu_note_context_switch+0x710/0x710 [ 901.001053] should_failslab+0xec/0x120 [ 901.005033] kmem_cache_alloc_node_trace+0x5a/0x760 [ 901.010043] ? mark_held_locks+0xaf/0x100 [ 901.014175] ? __raw_spin_lock_init+0x1c/0x100 [ 901.018746] __kmalloc_node+0x33/0x70 [ 901.022531] kvmalloc_node+0x99/0xd0 [ 901.026236] __list_lru_init+0x5d5/0x750 [ 901.030288] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 901.036157] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 901.041163] ? lockdep_init_map+0x9/0x10 [ 901.045203] sget_userns+0x6b1/0xe40 [ 901.048893] ? set_anon_super+0x20/0x20 [ 901.052842] ? put_filp+0x90/0x90 [ 901.056271] ? destroy_unused_super.part.6+0xd0/0xd0 [ 901.061358] ? alloc_vfsmnt+0x762/0x9c0 [ 901.065320] ? path_lookupat+0x238/0xba0 [ 901.069357] ? mnt_free_id.isra.21+0x50/0x50 [ 901.073755] ? trace_hardirqs_off+0x10/0x10 [ 901.078055] ? putname+0xee/0x130 [ 901.081487] ? cap_capable+0x1b5/0x230 [ 901.085354] ? security_capable+0x8e/0xc0 [ 901.089505] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 901.094674] ? ns_capable_common+0xcf/0x160 [ 901.098976] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 901.104150] mount_ns+0x6d/0x190 [ 901.107510] rpc_mount+0x9e/0xd0 [ 901.110873] mount_fs+0x66/0x2d0 [ 901.114235] vfs_kern_mount.part.26+0xc6/0x4a0 [ 901.118804] ? may_umount+0xa0/0xa0 [ 901.122408] ? _raw_read_unlock+0x22/0x30 [ 901.126542] ? __get_fs_type+0x8a/0xc0 [ 901.130411] do_mount+0xea4/0x2bb0 [ 901.133928] ? __might_fault+0x110/0x1d0 [ 901.137968] ? copy_mount_string+0x40/0x40 [ 901.142186] ? check_same_owner+0x320/0x320 [ 901.146499] ? __check_object_size+0x8b/0x530 [ 901.150972] ? __might_sleep+0x95/0x190 [ 901.154935] ? kasan_check_write+0x14/0x20 [ 901.159152] ? _copy_from_user+0x99/0x110 [ 901.163280] ? memdup_user+0x5e/0x90 [ 901.166977] ? copy_mount_options+0x1f7/0x2e0 [ 901.171461] SyS_mount+0xab/0x120 [ 901.174902] ? copy_mnt_ns+0xb30/0xb30 [ 901.178776] do_syscall_64+0x281/0x940 [ 901.182646] ? vmalloc_sync_all+0x30/0x30 [ 901.186783] ? _raw_spin_unlock_irq+0x27/0x70 [ 901.191272] ? finish_task_switch+0x1c1/0x7e0 [ 901.195760] ? syscall_return_slowpath+0x550/0x550 [ 901.200675] ? syscall_return_slowpath+0x2ac/0x550 [ 901.205587] ? prepare_exit_to_usermode+0x350/0x350 [ 901.210592] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 901.215948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.220772] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 901.225949] RIP: 0033:0x454e79 [ 901.229118] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.236811] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 901.244070] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 901.251330] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 901.258581] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 19:01:50 executing program 7 (fault-call:15 fault-nth:28): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:50 executing program 3 (fault-call:17 fault-nth:22): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 901.265827] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/30 19:01:50 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:50 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair$inet(0x2, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r3, 0x6, 0x1}, 0x14) [ 901.400293] FAULT_INJECTION: forcing a failure. [ 901.400293] name failslab, interval 1, probability 0, space 0, times 0 [ 901.411658] CPU: 0 PID: 27082 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 901.418934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.422256] FAULT_INJECTION: forcing a failure. [ 901.422256] name failslab, interval 1, probability 0, space 0, times 0 [ 901.428280] Call Trace: [ 901.428304] dump_stack+0x194/0x24d [ 901.428318] ? arch_local_irq_restore+0x53/0x53 [ 901.428333] ? __save_stack_trace+0x7e/0xd0 [ 901.428351] should_fail+0x8c0/0xa40 [ 901.458355] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 901.463446] ? kasan_kmalloc+0xad/0xe0 [ 901.467318] ? kmem_cache_alloc_trace+0x136/0x740 [ 901.472146] ? __memcg_init_list_lru_node+0x169/0x270 [ 901.477316] ? __list_lru_init+0x544/0x750 [ 901.481531] ? sget_userns+0x6b1/0xe40 [ 901.485403] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 901.490140] ? do_mount+0xea4/0x2bb0 [ 901.493836] ? SyS_mount+0xab/0x120 [ 901.497444] ? do_syscall_64+0x281/0x940 [ 901.501487] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 901.506840] ? find_held_lock+0x35/0x1d0 [ 901.510889] ? __lock_is_held+0xb6/0x140 [ 901.514940] ? check_same_owner+0x320/0x320 [ 901.519246] ? rcu_note_context_switch+0x710/0x710 [ 901.524163] should_failslab+0xec/0x120 [ 901.528120] kmem_cache_alloc_trace+0x4b/0x740 [ 901.532689] ? __kmalloc_node+0x33/0x70 [ 901.536647] ? __kmalloc_node+0x33/0x70 [ 901.540603] ? rcu_read_lock_sched_held+0x108/0x120 [ 901.545603] __memcg_init_list_lru_node+0x169/0x270 [ 901.550615] ? list_lru_add+0x7c0/0x7c0 [ 901.554571] ? __kmalloc_node+0x47/0x70 [ 901.558535] __list_lru_init+0x544/0x750 [ 901.562589] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 901.568458] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 901.573461] ? lockdep_init_map+0x9/0x10 [ 901.577506] sget_userns+0x6b1/0xe40 [ 901.581201] ? set_anon_super+0x20/0x20 [ 901.585160] ? put_filp+0x90/0x90 [ 901.588598] ? destroy_unused_super.part.6+0xd0/0xd0 [ 901.593687] ? alloc_vfsmnt+0x762/0x9c0 [ 901.597646] ? path_lookupat+0x238/0xba0 [ 901.601689] ? mnt_free_id.isra.21+0x50/0x50 [ 901.606084] ? trace_hardirqs_off+0x10/0x10 [ 901.610392] ? putname+0xee/0x130 [ 901.613830] ? cap_capable+0x1b5/0x230 [ 901.617705] ? security_capable+0x8e/0xc0 [ 901.621846] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 901.627017] ? ns_capable_common+0xcf/0x160 [ 901.631325] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 901.636495] mount_ns+0x6d/0x190 [ 901.639847] rpc_mount+0x9e/0xd0 [ 901.643195] mount_fs+0x66/0x2d0 [ 901.646545] vfs_kern_mount.part.26+0xc6/0x4a0 [ 901.651108] ? may_umount+0xa0/0xa0 [ 901.654717] ? _raw_read_unlock+0x22/0x30 [ 901.658847] ? __get_fs_type+0x8a/0xc0 [ 901.662719] do_mount+0xea4/0x2bb0 [ 901.666242] ? __might_fault+0x110/0x1d0 [ 901.670287] ? copy_mount_string+0x40/0x40 [ 901.674503] ? check_same_owner+0x320/0x320 [ 901.678809] ? __check_object_size+0x8b/0x530 [ 901.683291] ? __might_sleep+0x95/0x190 [ 901.687253] ? kasan_check_write+0x14/0x20 [ 901.691471] ? _copy_from_user+0x99/0x110 [ 901.695605] ? memdup_user+0x5e/0x90 [ 901.699304] ? copy_mount_options+0x1f7/0x2e0 [ 901.703783] SyS_mount+0xab/0x120 [ 901.708692] ? copy_mnt_ns+0xb30/0xb30 [ 901.712561] do_syscall_64+0x281/0x940 [ 901.716442] ? vmalloc_sync_all+0x30/0x30 [ 901.720588] ? _raw_spin_unlock_irq+0x27/0x70 [ 901.725068] ? finish_task_switch+0x1c1/0x7e0 [ 901.729547] ? syscall_return_slowpath+0x550/0x550 [ 901.734462] ? syscall_return_slowpath+0x2ac/0x550 [ 901.739375] ? prepare_exit_to_usermode+0x350/0x350 [ 901.744376] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 901.749724] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 901.754553] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 901.759727] RIP: 0033:0x454e79 [ 901.762899] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 901.770591] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 901.777842] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 901.785097] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 901.792347] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 2018/03/30 19:01:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000280)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2c", 0xbd}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() [ 901.799598] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 901.806866] CPU: 1 PID: 27081 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 901.814135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 901.823480] Call Trace: [ 901.826076] dump_stack+0x194/0x24d [ 901.829706] ? arch_local_irq_restore+0x53/0x53 [ 901.834382] should_fail+0x8c0/0xa40 [ 901.838094] ? is_bpf_text_address+0xa4/0x120 [ 901.842583] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 901.847686] ? __kernel_text_address+0xd/0x40 [ 901.852183] ? unwind_get_return_address+0x61/0xa0 [ 901.857118] ? find_held_lock+0x35/0x1d0 [ 901.861179] ? __lock_is_held+0xb6/0x140 [ 901.865248] ? check_same_owner+0x320/0x320 [ 901.869569] ? rcu_note_context_switch+0x710/0x710 [ 901.874503] should_failslab+0xec/0x120 [ 901.878466] kmem_cache_alloc_trace+0x4b/0x740 [ 901.883033] ? __kmalloc_node+0x33/0x70 [ 901.886990] ? __kmalloc_node+0x33/0x70 [ 901.890944] ? rcu_read_lock_sched_held+0x108/0x120 [ 901.895945] __memcg_init_list_lru_node+0x169/0x270 [ 901.900955] ? list_lru_add+0x7c0/0x7c0 [ 901.904912] ? __kmalloc_node+0x47/0x70 [ 901.908871] __list_lru_init+0x544/0x750 [ 901.912911] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 901.918780] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 901.923779] ? lockdep_init_map+0x9/0x10 [ 901.927817] sget_userns+0x6b1/0xe40 [ 901.931506] ? set_anon_super+0x20/0x20 [ 901.935457] ? put_filp+0x90/0x90 [ 901.938893] ? destroy_unused_super.part.6+0xd0/0xd0 [ 901.943976] ? alloc_vfsmnt+0x762/0x9c0 [ 901.947924] ? path_lookupat+0x238/0xba0 [ 901.951966] ? mnt_free_id.isra.21+0x50/0x50 [ 901.956368] ? trace_hardirqs_off+0x10/0x10 [ 901.960681] ? mark_held_locks+0xaf/0x100 [ 901.964812] ? cap_capable+0x1b5/0x230 [ 901.968676] ? security_capable+0x8e/0xc0 [ 901.972810] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 901.977985] ? ns_capable_common+0xcf/0x160 [ 901.982287] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 901.987456] mount_ns+0x6d/0x190 [ 901.990807] rpc_mount+0x9e/0xd0 [ 901.994150] mount_fs+0x66/0x2d0 [ 901.997494] vfs_kern_mount.part.26+0xc6/0x4a0 [ 902.002066] ? may_umount+0xa0/0xa0 [ 902.005674] ? _raw_read_unlock+0x22/0x30 [ 902.009796] ? __get_fs_type+0x8a/0xc0 [ 902.013668] do_mount+0xea4/0x2bb0 [ 902.017191] ? __might_fault+0x110/0x1d0 [ 902.021239] ? copy_mount_string+0x40/0x40 [ 902.025454] ? check_same_owner+0x320/0x320 [ 902.029751] ? __check_object_size+0x8b/0x530 [ 902.034222] ? __might_sleep+0x95/0x190 [ 902.038184] ? kasan_check_write+0x14/0x20 [ 902.042410] ? _copy_from_user+0x99/0x110 [ 902.046545] ? memdup_user+0x5e/0x90 [ 902.050235] ? copy_mount_options+0x1f7/0x2e0 [ 902.054706] SyS_mount+0xab/0x120 [ 902.058134] ? copy_mnt_ns+0xb30/0xb30 [ 902.062003] do_syscall_64+0x281/0x940 [ 902.065872] ? vmalloc_sync_all+0x30/0x30 [ 902.070006] ? _raw_spin_unlock_irq+0x27/0x70 [ 902.074483] ? finish_task_switch+0x1c1/0x7e0 [ 902.078967] ? syscall_return_slowpath+0x550/0x550 [ 902.083882] ? syscall_return_slowpath+0x2ac/0x550 [ 902.088803] ? prepare_exit_to_usermode+0x350/0x350 [ 902.093797] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 902.099149] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 902.103972] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 902.109137] RIP: 0033:0x454e79 [ 902.112305] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.119993] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 902.127246] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 902.134495] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 902.141754] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 902.149009] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/30 19:01:51 executing program 7 (fault-call:15 fault-nth:29): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 3 (fault-call:17 fault-nth:23): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2c", 0xbd}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) recvmsg(r4, &(0x7f0000000280)={&(0x7f0000000500)=@rc, 0x80, &(0x7f0000000200)=[{&(0x7f0000000c00)=""/4096, 0x1000}], 0x1, &(0x7f00000009c0)=""/186, 0xba, 0x95}, 0x40000001) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x0, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 902.351204] FAULT_INJECTION: forcing a failure. [ 902.351204] name failslab, interval 1, probability 0, space 0, times 0 [ 902.355217] FAULT_INJECTION: forcing a failure. [ 902.355217] name failslab, interval 1, probability 0, space 0, times 0 [ 902.362476] CPU: 0 PID: 27119 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 902.362485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.362489] Call Trace: [ 902.362508] dump_stack+0x194/0x24d [ 902.362524] ? arch_local_irq_restore+0x53/0x53 [ 902.401097] ? __save_stack_trace+0x7e/0xd0 [ 902.405413] should_fail+0x8c0/0xa40 [ 902.409113] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 902.414201] ? kasan_kmalloc+0xad/0xe0 [ 902.418074] ? kmem_cache_alloc_trace+0x136/0x740 [ 902.422899] ? __memcg_init_list_lru_node+0x169/0x270 [ 902.428072] ? __list_lru_init+0x544/0x750 [ 902.432291] ? sget_userns+0x6b1/0xe40 [ 902.436162] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 902.441336] ? do_mount+0xea4/0x2bb0 [ 902.445033] ? SyS_mount+0xab/0x120 [ 902.448642] ? do_syscall_64+0x281/0x940 [ 902.452685] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 902.458040] ? find_held_lock+0x35/0x1d0 [ 902.462090] ? __lock_is_held+0xb6/0x140 [ 902.466140] ? check_same_owner+0x320/0x320 [ 902.470445] ? rcu_note_context_switch+0x710/0x710 [ 902.475362] should_failslab+0xec/0x120 [ 902.479319] kmem_cache_alloc_trace+0x4b/0x740 [ 902.483883] ? __kmalloc_node+0x33/0x70 [ 902.487837] ? __kmalloc_node+0x33/0x70 [ 902.491801] ? rcu_read_lock_sched_held+0x108/0x120 [ 902.496800] __memcg_init_list_lru_node+0x169/0x270 [ 902.501801] ? list_lru_add+0x7c0/0x7c0 [ 902.505759] ? __kmalloc_node+0x47/0x70 [ 902.509722] __list_lru_init+0x544/0x750 [ 902.513771] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 902.519636] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 902.524638] ? lockdep_init_map+0x9/0x10 [ 902.528684] sget_userns+0x6b1/0xe40 [ 902.532379] ? set_anon_super+0x20/0x20 [ 902.536338] ? put_filp+0x90/0x90 [ 902.539774] ? destroy_unused_super.part.6+0xd0/0xd0 [ 902.544860] ? alloc_vfsmnt+0x762/0x9c0 [ 902.548814] ? path_lookupat+0x238/0xba0 [ 902.552859] ? mnt_free_id.isra.21+0x50/0x50 [ 902.557252] ? trace_hardirqs_off+0x10/0x10 [ 902.561560] ? putname+0xee/0x130 [ 902.565000] ? cap_capable+0x1b5/0x230 [ 902.568875] ? security_capable+0x8e/0xc0 [ 902.573011] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 902.578188] ? ns_capable_common+0xcf/0x160 [ 902.582496] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 902.587667] mount_ns+0x6d/0x190 [ 902.591020] rpc_mount+0x9e/0xd0 [ 902.594374] mount_fs+0x66/0x2d0 [ 902.597727] vfs_kern_mount.part.26+0xc6/0x4a0 [ 902.602292] ? may_umount+0xa0/0xa0 [ 902.605901] ? _raw_read_unlock+0x22/0x30 [ 902.610031] ? __get_fs_type+0x8a/0xc0 [ 902.613906] do_mount+0xea4/0x2bb0 [ 902.617427] ? __might_fault+0x110/0x1d0 [ 902.621471] ? copy_mount_string+0x40/0x40 [ 902.625688] ? check_same_owner+0x320/0x320 [ 902.629994] ? __check_object_size+0x8b/0x530 [ 902.634486] ? __might_sleep+0x95/0x190 [ 902.638450] ? kasan_check_write+0x14/0x20 [ 902.642672] ? _copy_from_user+0x99/0x110 [ 902.646807] ? memdup_user+0x5e/0x90 [ 902.650520] ? copy_mount_options+0x1f7/0x2e0 [ 902.655007] SyS_mount+0xab/0x120 [ 902.658443] ? copy_mnt_ns+0xb30/0xb30 [ 902.662315] do_syscall_64+0x281/0x940 [ 902.666184] ? vmalloc_sync_all+0x30/0x30 [ 902.670315] ? _raw_spin_unlock_irq+0x27/0x70 [ 902.674794] ? finish_task_switch+0x1c1/0x7e0 [ 902.679275] ? syscall_return_slowpath+0x550/0x550 [ 902.684202] ? syscall_return_slowpath+0x2ac/0x550 [ 902.689116] ? prepare_exit_to_usermode+0x350/0x350 [ 902.694114] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 902.699463] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 902.704296] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 902.709468] RIP: 0033:0x454e79 [ 902.712641] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 902.720332] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 902.727587] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 902.734843] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 902.742095] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 902.749348] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 [ 902.756618] CPU: 1 PID: 27118 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 902.763891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 902.773239] Call Trace: [ 902.775825] dump_stack+0x194/0x24d [ 902.779454] ? arch_local_irq_restore+0x53/0x53 [ 902.784125] ? __save_stack_trace+0x7e/0xd0 [ 902.788448] should_fail+0x8c0/0xa40 [ 902.792170] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 902.797269] ? kasan_kmalloc+0xad/0xe0 [ 902.801152] ? kmem_cache_alloc_trace+0x136/0x740 [ 902.805998] ? __memcg_init_list_lru_node+0x169/0x270 [ 902.811184] ? __list_lru_init+0x544/0x750 [ 902.815398] ? sget_userns+0x6b1/0xe40 [ 902.819272] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 902.824014] ? do_mount+0xea4/0x2bb0 [ 902.827736] ? SyS_mount+0xab/0x120 [ 902.831355] ? do_syscall_64+0x281/0x940 [ 902.835409] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 902.840763] ? find_held_lock+0x35/0x1d0 [ 902.844802] ? __lock_is_held+0xb6/0x140 [ 902.848849] ? check_same_owner+0x320/0x320 [ 902.853157] ? rcu_note_context_switch+0x710/0x710 [ 902.858073] should_failslab+0xec/0x120 [ 902.862034] kmem_cache_alloc_trace+0x4b/0x740 [ 902.866606] ? __kmalloc_node+0x33/0x70 [ 902.870564] ? __kmalloc_node+0x33/0x70 [ 902.874586] ? rcu_read_lock_sched_held+0x108/0x120 [ 902.879587] __memcg_init_list_lru_node+0x169/0x270 [ 902.884588] ? list_lru_add+0x7c0/0x7c0 [ 902.888545] ? __kmalloc_node+0x47/0x70 [ 902.892509] __list_lru_init+0x544/0x750 [ 902.896556] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 902.902425] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 902.907429] ? lockdep_init_map+0x9/0x10 [ 902.911471] sget_userns+0x6b1/0xe40 [ 902.915169] ? set_anon_super+0x20/0x20 [ 902.919133] ? put_filp+0x90/0x90 [ 902.922574] ? destroy_unused_super.part.6+0xd0/0xd0 [ 902.927661] ? alloc_vfsmnt+0x762/0x9c0 [ 902.931626] ? path_lookupat+0x238/0xba0 [ 902.935675] ? mnt_free_id.isra.21+0x50/0x50 [ 902.940079] ? trace_hardirqs_off+0x10/0x10 [ 902.944394] ? putname+0xee/0x130 [ 902.947840] ? cap_capable+0x1b5/0x230 [ 902.951704] ? security_capable+0x8e/0xc0 [ 902.955837] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 902.961015] ? ns_capable_common+0xcf/0x160 [ 902.965337] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 902.970525] mount_ns+0x6d/0x190 [ 902.973885] rpc_mount+0x9e/0xd0 [ 902.977230] mount_fs+0x66/0x2d0 [ 902.980582] vfs_kern_mount.part.26+0xc6/0x4a0 [ 902.985156] ? may_umount+0xa0/0xa0 [ 902.988783] ? _raw_read_unlock+0x22/0x30 [ 902.992912] ? __get_fs_type+0x8a/0xc0 [ 902.996778] do_mount+0xea4/0x2bb0 [ 903.000297] ? __might_fault+0x110/0x1d0 [ 903.004352] ? copy_mount_string+0x40/0x40 [ 903.008570] ? check_same_owner+0x320/0x320 [ 903.012874] ? __check_object_size+0x8b/0x530 [ 903.017356] ? __might_sleep+0x95/0x190 [ 903.021319] ? kasan_check_write+0x14/0x20 [ 903.025551] ? _copy_from_user+0x99/0x110 [ 903.029679] ? memdup_user+0x5e/0x90 [ 903.033372] ? copy_mount_options+0x1f7/0x2e0 [ 903.037868] SyS_mount+0xab/0x120 [ 903.041308] ? copy_mnt_ns+0xb30/0xb30 [ 903.045191] do_syscall_64+0x281/0x940 [ 903.049072] ? vmalloc_sync_all+0x30/0x30 [ 903.053209] ? _raw_spin_unlock_irq+0x27/0x70 [ 903.057701] ? finish_task_switch+0x1c1/0x7e0 [ 903.062188] ? syscall_return_slowpath+0x550/0x550 [ 903.067103] ? syscall_return_slowpath+0x2ac/0x550 [ 903.072023] ? prepare_exit_to_usermode+0x350/0x350 [ 903.077041] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 903.082386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.087220] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 903.092396] RIP: 0033:0x454e79 [ 903.095565] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:01:52 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x6, 0x0, 0x7fff, &(0x7f0000000240)={0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000000)="fccfade8783ab22fb39ee7f538c8697565acc4b3c16f88ca43c7447c5885062f462f1a472fb76ec8e72f29b3fd6c64849e60d772ad1669e629b55a18a4dd608e327809", &(0x7f0000000080)=""/98}, 0x18) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000380)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000400)=""/13, 0xd}, {&(0x7f0000000580)=""/191, 0xbf}, {&(0x7f0000000640)=""/187, 0xbb}], 0x3, &(0x7f0000000700)=""/143, 0x8f, 0x8}, 0x22) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xb, 0x8, &(0x7f0000000280)=@raw=[@exit={0x95}, @call={0x85, 0x0, 0x0, 0x1d}, @ldst={0x3, 0x1, 0x6, 0x5, 0x6, 0x4}, @call={0x85, 0x0, 0x0, 0x9}], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x68, &(0x7f0000000300)=""/104, 0x0, 0x1, [], r3}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)}, 0x10) close(r2) [ 903.103256] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 903.110509] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 903.117766] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 903.125034] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 903.132296] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/30 19:01:52 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:52 executing program 3 (fault-call:17 fault-nth:24): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:52 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:52 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2c", 0xbd}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:52 executing program 7 (fault-call:15 fault-nth:30): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x80000000, 0x101, 0x7, 0x0, 0x1, r0, 0x0, [0x115]}, 0xfffffffffffffc58) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000e00)={r2}) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000580)) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0xa5bc, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r4 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r4, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r3}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000300)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000002c0)) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x28, &(0x7f0000000500)}, 0x10) [ 903.283771] FAULT_INJECTION: forcing a failure. [ 903.283771] name failslab, interval 1, probability 0, space 0, times 0 [ 903.295150] CPU: 1 PID: 27148 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 903.302427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.311781] Call Trace: [ 903.314381] dump_stack+0x194/0x24d [ 903.318018] ? arch_local_irq_restore+0x53/0x53 [ 903.319978] FAULT_INJECTION: forcing a failure. [ 903.319978] name failslab, interval 1, probability 0, space 0, times 0 [ 903.322688] ? __save_stack_trace+0x7e/0xd0 [ 903.322709] should_fail+0x8c0/0xa40 [ 903.322724] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 903.322738] ? kasan_kmalloc+0xad/0xe0 [ 903.322745] ? kmem_cache_alloc_trace+0x136/0x740 [ 903.322761] ? __memcg_init_list_lru_node+0x169/0x270 [ 903.360881] ? __list_lru_init+0x544/0x750 [ 903.365100] ? sget_userns+0x6b1/0xe40 [ 903.368974] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 903.373710] ? do_mount+0xea4/0x2bb0 [ 903.377406] ? SyS_mount+0xab/0x120 [ 903.381016] ? do_syscall_64+0x281/0x940 [ 903.385064] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 903.390416] ? find_held_lock+0x35/0x1d0 [ 903.394462] ? __lock_is_held+0xb6/0x140 [ 903.398513] ? check_same_owner+0x320/0x320 [ 903.402818] ? rcu_note_context_switch+0x710/0x710 [ 903.407733] should_failslab+0xec/0x120 [ 903.411692] kmem_cache_alloc_trace+0x4b/0x740 [ 903.416256] ? __kmalloc_node+0x33/0x70 [ 903.420211] ? __kmalloc_node+0x33/0x70 [ 903.424165] ? rcu_read_lock_sched_held+0x108/0x120 [ 903.429166] __memcg_init_list_lru_node+0x169/0x270 [ 903.434167] ? list_lru_add+0x7c0/0x7c0 [ 903.438126] ? __kmalloc_node+0x47/0x70 [ 903.442085] __list_lru_init+0x544/0x750 [ 903.446133] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 903.451999] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 903.457003] ? lockdep_init_map+0x9/0x10 [ 903.461051] sget_userns+0x6b1/0xe40 [ 903.464746] ? set_anon_super+0x20/0x20 [ 903.468703] ? put_filp+0x90/0x90 [ 903.472142] ? destroy_unused_super.part.6+0xd0/0xd0 [ 903.477227] ? alloc_vfsmnt+0x762/0x9c0 [ 903.481183] ? path_lookupat+0x238/0xba0 [ 903.485228] ? mnt_free_id.isra.21+0x50/0x50 [ 903.489622] ? trace_hardirqs_off+0x10/0x10 [ 903.493927] ? putname+0xee/0x130 [ 903.497365] ? cap_capable+0x1b5/0x230 [ 903.501236] ? security_capable+0x8e/0xc0 [ 903.505369] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 903.510545] ? ns_capable_common+0xcf/0x160 [ 903.514854] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 903.520029] mount_ns+0x6d/0x190 [ 903.523380] rpc_mount+0x9e/0xd0 [ 903.526816] mount_fs+0x66/0x2d0 [ 903.530169] vfs_kern_mount.part.26+0xc6/0x4a0 [ 903.534733] ? may_umount+0xa0/0xa0 [ 903.538341] ? _raw_read_unlock+0x22/0x30 [ 903.542470] ? __get_fs_type+0x8a/0xc0 [ 903.546344] do_mount+0xea4/0x2bb0 [ 903.549864] ? __might_fault+0x110/0x1d0 [ 903.553912] ? copy_mount_string+0x40/0x40 [ 903.558127] ? check_same_owner+0x320/0x320 [ 903.562435] ? __check_object_size+0x8b/0x530 [ 903.566919] ? __might_sleep+0x95/0x190 [ 903.570891] ? kasan_check_write+0x14/0x20 [ 903.575108] ? _copy_from_user+0x99/0x110 [ 903.579245] ? memdup_user+0x5e/0x90 [ 903.582942] ? copy_mount_options+0x1f7/0x2e0 [ 903.587431] SyS_mount+0xab/0x120 [ 903.590868] ? copy_mnt_ns+0xb30/0xb30 [ 903.594739] do_syscall_64+0x281/0x940 [ 903.598611] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 903.604131] ? syscall_return_slowpath+0x550/0x550 [ 903.609046] ? syscall_return_slowpath+0x2ac/0x550 [ 903.613959] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 903.619333] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.624181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 903.629352] RIP: 0033:0x454e79 [ 903.632525] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 903.640215] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 903.647469] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 903.654718] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 903.661971] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 903.669222] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 903.676487] CPU: 0 PID: 27161 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 903.683757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 903.693091] Call Trace: [ 903.695669] dump_stack+0x194/0x24d [ 903.699288] ? arch_local_irq_restore+0x53/0x53 [ 903.703936] ? __save_stack_trace+0x7e/0xd0 [ 903.708254] should_fail+0x8c0/0xa40 [ 903.711959] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 903.717055] ? kasan_kmalloc+0xad/0xe0 [ 903.720927] ? kmem_cache_alloc_trace+0x136/0x740 [ 903.725746] ? __memcg_init_list_lru_node+0x169/0x270 [ 903.730911] ? __list_lru_init+0x544/0x750 [ 903.735126] ? sget_userns+0x6b1/0xe40 [ 903.738993] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 903.743737] ? do_mount+0xea4/0x2bb0 [ 903.747435] ? SyS_mount+0xab/0x120 [ 903.751047] ? do_syscall_64+0x281/0x940 [ 903.755093] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 903.760441] ? find_held_lock+0x35/0x1d0 [ 903.764482] ? __lock_is_held+0xb6/0x140 [ 903.768546] ? check_same_owner+0x320/0x320 [ 903.772855] ? rcu_note_context_switch+0x710/0x710 [ 903.777776] should_failslab+0xec/0x120 [ 903.781753] kmem_cache_alloc_trace+0x4b/0x740 [ 903.786326] ? __kmalloc_node+0x33/0x70 [ 903.790292] ? __kmalloc_node+0x33/0x70 [ 903.794249] ? rcu_read_lock_sched_held+0x108/0x120 [ 903.799248] __memcg_init_list_lru_node+0x169/0x270 [ 903.804257] ? list_lru_add+0x7c0/0x7c0 [ 903.808230] ? __kmalloc_node+0x47/0x70 [ 903.812195] __list_lru_init+0x544/0x750 [ 903.816248] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 903.822121] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 903.827135] ? lockdep_init_map+0x9/0x10 [ 903.831182] sget_userns+0x6b1/0xe40 [ 903.834872] ? set_anon_super+0x20/0x20 [ 903.838825] ? put_filp+0x90/0x90 [ 903.842263] ? destroy_unused_super.part.6+0xd0/0xd0 [ 903.847352] ? alloc_vfsmnt+0x762/0x9c0 [ 903.851312] ? path_lookupat+0x238/0xba0 [ 903.855355] ? mnt_free_id.isra.21+0x50/0x50 [ 903.859744] ? trace_hardirqs_off+0x10/0x10 [ 903.864052] ? putname+0xee/0x130 [ 903.867500] ? cap_capable+0x1b5/0x230 [ 903.871374] ? security_capable+0x8e/0xc0 [ 903.875503] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 903.880684] ? ns_capable_common+0xcf/0x160 [ 903.884999] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 903.890175] mount_ns+0x6d/0x190 [ 903.893528] rpc_mount+0x9e/0xd0 [ 903.896882] mount_fs+0x66/0x2d0 [ 903.900231] vfs_kern_mount.part.26+0xc6/0x4a0 [ 903.904791] ? may_umount+0xa0/0xa0 [ 903.908409] ? _raw_read_unlock+0x22/0x30 [ 903.912536] ? __get_fs_type+0x8a/0xc0 [ 903.916404] do_mount+0xea4/0x2bb0 [ 903.919932] ? __might_fault+0x110/0x1d0 [ 903.923978] ? copy_mount_string+0x40/0x40 [ 903.928198] ? check_same_owner+0x320/0x320 [ 903.932500] ? __check_object_size+0x8b/0x530 [ 903.937004] ? __might_sleep+0x95/0x190 [ 903.940968] ? kasan_check_write+0x14/0x20 [ 903.945184] ? _copy_from_user+0x99/0x110 [ 903.949317] ? memdup_user+0x5e/0x90 [ 903.953013] ? copy_mount_options+0x1f7/0x2e0 [ 903.957500] SyS_mount+0xab/0x120 [ 903.960949] ? copy_mnt_ns+0xb30/0xb30 [ 903.964818] do_syscall_64+0x281/0x940 [ 903.968690] ? vmalloc_sync_all+0x30/0x30 [ 903.972823] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 903.978355] ? syscall_return_slowpath+0x550/0x550 [ 903.983282] ? syscall_return_slowpath+0x2ac/0x550 [ 903.988208] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 903.993571] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 903.998418] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 904.003600] RIP: 0033:0x454e79 [ 904.006779] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 904.014477] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 904.021741] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 904.029004] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 904.036278] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 904.043540] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/30 19:01:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(r4) 2018/03/30 19:01:53 executing program 3 (fault-call:17 fault-nth:25): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:53 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) 2018/03/30 19:01:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:53 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x0, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:53 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc", 0xca}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:53 executing program 7 (fault-call:15 fault-nth:31): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 904.227800] FAULT_INJECTION: forcing a failure. [ 904.227800] name failslab, interval 1, probability 0, space 0, times 0 [ 904.239360] CPU: 0 PID: 27190 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 904.246644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.255997] Call Trace: [ 904.258582] dump_stack+0x194/0x24d [ 904.262198] ? arch_local_irq_restore+0x53/0x53 [ 904.266854] ? find_held_lock+0x35/0x1d0 [ 904.270899] should_fail+0x8c0/0xa40 [ 904.274587] ? __list_lru_init+0x352/0x750 [ 904.278799] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 904.283880] ? find_next_zero_bit+0xe3/0x110 [ 904.288265] ? trace_hardirqs_off+0x10/0x10 [ 904.292564] ? find_held_lock+0x35/0x1d0 [ 904.296603] ? __lock_is_held+0xb6/0x140 [ 904.300644] ? check_same_owner+0x320/0x320 [ 904.304941] ? lock_downgrade+0x980/0x980 [ 904.309066] ? rcu_note_context_switch+0x710/0x710 [ 904.313970] ? find_held_lock+0x35/0x1d0 [ 904.318012] should_failslab+0xec/0x120 [ 904.321969] __kmalloc+0x63/0x760 [ 904.325400] ? lock_downgrade+0x980/0x980 [ 904.329525] ? register_shrinker+0x10e/0x2d0 [ 904.333914] ? trace_event_raw_event_module_request+0x320/0x320 [ 904.339950] register_shrinker+0x10e/0x2d0 [ 904.344165] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 904.349939] ? memcpy+0x45/0x50 [ 904.353199] sget_userns+0xbbf/0xe40 [ 904.356891] ? set_anon_super+0x20/0x20 [ 904.360840] ? put_filp+0x90/0x90 [ 904.364270] ? destroy_unused_super.part.6+0xd0/0xd0 [ 904.369352] ? path_lookupat+0x238/0xba0 [ 904.373393] ? mnt_free_id.isra.21+0x50/0x50 [ 904.377782] ? trace_hardirqs_off+0x10/0x10 [ 904.382080] ? putname+0xee/0x130 [ 904.385516] ? cap_capable+0x1b5/0x230 [ 904.389380] ? security_capable+0x8e/0xc0 [ 904.393512] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 904.398682] ? ns_capable_common+0xcf/0x160 [ 904.402982] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 904.408150] mount_ns+0x6d/0x190 [ 904.411491] rpc_mount+0x9e/0xd0 [ 904.414837] mount_fs+0x66/0x2d0 [ 904.418181] vfs_kern_mount.part.26+0xc6/0x4a0 [ 904.422740] ? may_umount+0xa0/0xa0 [ 904.426343] ? _raw_read_unlock+0x22/0x30 [ 904.430465] ? __get_fs_type+0x8a/0xc0 [ 904.434329] do_mount+0xea4/0x2bb0 [ 904.437856] ? __might_fault+0x110/0x1d0 [ 904.441895] ? copy_mount_string+0x40/0x40 [ 904.446105] ? check_same_owner+0x320/0x320 [ 904.450404] ? __check_object_size+0x8b/0x530 [ 904.454878] ? __might_sleep+0x95/0x190 [ 904.458832] ? kasan_check_write+0x14/0x20 [ 904.463045] ? _copy_from_user+0x99/0x110 [ 904.467169] ? memdup_user+0x5e/0x90 [ 904.470860] ? copy_mount_options+0x1f7/0x2e0 [ 904.475332] SyS_mount+0xab/0x120 [ 904.478764] ? copy_mnt_ns+0xb30/0xb30 [ 904.482630] do_syscall_64+0x281/0x940 [ 904.486496] ? vmalloc_sync_all+0x30/0x30 [ 904.490619] ? _raw_spin_unlock_irq+0x27/0x70 [ 904.495091] ? finish_task_switch+0x1c1/0x7e0 [ 904.499564] ? syscall_return_slowpath+0x550/0x550 [ 904.504470] ? syscall_return_slowpath+0x2ac/0x550 [ 904.509580] ? prepare_exit_to_usermode+0x350/0x350 [ 904.514578] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 904.519922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 904.524747] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 904.529915] RIP: 0033:0x454e79 [ 904.533085] RSP: 002b:00007fc6df730c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 904.540772] RAX: ffffffffffffffda RBX: 00007fc6df7316d4 RCX: 0000000000454e79 [ 904.548022] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 904.555270] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 904.562520] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 904.569769] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 904.586983] FAULT_INJECTION: forcing a failure. [ 904.586983] name failslab, interval 1, probability 0, space 0, times 0 [ 904.598370] CPU: 1 PID: 27182 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #42 [ 904.605644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 904.614991] Call Trace: [ 904.617570] dump_stack+0x194/0x24d [ 904.621192] ? arch_local_irq_restore+0x53/0x53 [ 904.625858] ? __save_stack_trace+0x7e/0xd0 [ 904.630185] should_fail+0x8c0/0xa40 [ 904.633897] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 904.638998] ? kasan_kmalloc+0xad/0xe0 [ 904.642876] ? kmem_cache_alloc_trace+0x136/0x740 [ 904.647707] ? __memcg_init_list_lru_node+0x169/0x270 [ 904.652884] ? __list_lru_init+0x544/0x750 [ 904.657114] ? sget_userns+0x6b1/0xe40 [ 904.660994] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 904.665741] ? do_mount+0xea4/0x2bb0 [ 904.669435] ? SyS_mount+0xab/0x120 [ 904.673050] ? do_syscall_64+0x281/0x940 [ 904.677100] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 904.683487] ? find_held_lock+0x35/0x1d0 [ 904.687533] ? __lock_is_held+0xb6/0x140 [ 904.691591] ? check_same_owner+0x320/0x320 [ 904.695905] ? rcu_note_context_switch+0x710/0x710 [ 904.700834] should_failslab+0xec/0x120 [ 904.704794] kmem_cache_alloc_trace+0x4b/0x740 [ 904.709355] ? __kmalloc_node+0x33/0x70 [ 904.713307] ? __kmalloc_node+0x33/0x70 [ 904.717267] ? rcu_read_lock_sched_held+0x108/0x120 [ 904.722273] __memcg_init_list_lru_node+0x169/0x270 [ 904.727284] ? list_lru_add+0x7c0/0x7c0 [ 904.731247] ? __kmalloc_node+0x47/0x70 [ 904.735215] __list_lru_init+0x544/0x750 [ 904.739266] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 904.745143] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 904.750168] ? lockdep_init_map+0x9/0x10 [ 904.754216] sget_userns+0x6b1/0xe40 [ 904.757907] ? set_anon_super+0x20/0x20 [ 904.761866] ? put_filp+0x90/0x90 [ 904.765303] ? destroy_unused_super.part.6+0xd0/0xd0 [ 904.770396] ? alloc_vfsmnt+0x762/0x9c0 [ 904.774352] ? path_lookupat+0x238/0xba0 [ 904.778398] ? mnt_free_id.isra.21+0x50/0x50 [ 904.782786] ? trace_hardirqs_off+0x10/0x10 [ 904.787086] ? putname+0xee/0x130 [ 904.790520] ? cap_capable+0x1b5/0x230 [ 904.794386] ? security_capable+0x8e/0xc0 [ 904.798521] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 904.803699] ? ns_capable_common+0xcf/0x160 [ 904.808011] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 904.813185] mount_ns+0x6d/0x190 [ 904.816533] rpc_mount+0x9e/0xd0 [ 904.819878] mount_fs+0x66/0x2d0 [ 904.823240] vfs_kern_mount.part.26+0xc6/0x4a0 [ 904.827801] ? may_umount+0xa0/0xa0 [ 904.831406] ? _raw_read_unlock+0x22/0x30 [ 904.835538] ? __get_fs_type+0x8a/0xc0 [ 904.839404] do_mount+0xea4/0x2bb0 [ 904.842927] ? __might_fault+0x110/0x1d0 [ 904.846975] ? copy_mount_string+0x40/0x40 [ 904.851194] ? check_same_owner+0x320/0x320 [ 904.855493] ? __check_object_size+0x8b/0x530 [ 904.859967] ? __might_sleep+0x95/0x190 [ 904.863922] ? kasan_check_write+0x14/0x20 [ 904.868144] ? _copy_from_user+0x99/0x110 [ 904.872357] ? memdup_user+0x5e/0x90 [ 904.876051] ? copy_mount_options+0x1f7/0x2e0 [ 904.880531] SyS_mount+0xab/0x120 [ 904.883969] ? copy_mnt_ns+0xb30/0xb30 [ 904.887851] do_syscall_64+0x281/0x940 [ 904.891722] ? vmalloc_sync_all+0x30/0x30 [ 904.895848] ? _raw_spin_unlock_irq+0x27/0x70 [ 904.900332] ? finish_task_switch+0x1c1/0x7e0 [ 904.904817] ? syscall_return_slowpath+0x550/0x550 [ 904.909736] ? syscall_return_slowpath+0x2ac/0x550 [ 904.914650] ? prepare_exit_to_usermode+0x350/0x350 [ 904.919651] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 904.925001] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 904.929832] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 904.935001] RIP: 0033:0x454e79 [ 904.938171] RSP: 002b:00007fb13d902c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 904.945854] RAX: ffffffffffffffda RBX: 00007fb13d9036d4 RCX: 0000000000454e79 [ 904.953115] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 904.960374] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 904.967622] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 904.974875] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/30 19:01:54 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x0, [0x115]}, 0x2c) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x2367, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x8, 0x3, 0xfffffffffffffffb, 0x10, r1, 0x401}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) 2018/03/30 19:01:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc", 0xca}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() 2018/03/30 19:01:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x0, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:54 executing program 3 (fault-call:17 fault-nth:26): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:54 executing program 7 (fault-call:15 fault-nth:32): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x0, 0x1, r0, 0x0, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:01:54 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x0, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 905.074119] ------------[ cut here ]------------ [ 905.078939] refcount_t: increment on 0; use-after-free. [ 905.084457] WARNING: CPU: 1 PID: 4547 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 905.092160] Kernel panic - not syncing: panic_on_warn set ... [ 905.092160] [ 905.099519] CPU: 1 PID: 4547 Comm: syz-executor7 Not tainted 4.16.0-rc6+ #42 [ 905.106696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 905.116038] Call Trace: [ 905.118619] dump_stack+0x194/0x24d [ 905.122251] ? arch_local_irq_restore+0x53/0x53 [ 905.126919] ? vsnprintf+0x1ed/0x1900 [ 905.130760] panic+0x1e4/0x41c [ 905.133929] ? refcount_error_report+0x214/0x214 [ 905.138673] ? show_regs_print_info+0x18/0x18 [ 905.143157] ? __warn+0x1c1/0x200 [ 905.146602] ? refcount_inc+0x47/0x50 [ 905.150378] __warn+0x1dc/0x200 [ 905.153635] ? refcount_inc+0x47/0x50 [ 905.157412] report_bug+0x1f4/0x2b0 [ 905.161074] fixup_bug.part.10+0x37/0x80 [ 905.165120] do_error_trap+0x2d7/0x3e0 [ 905.169004] ? vprintk_default+0x28/0x30 [ 905.173048] ? math_error+0x400/0x400 [ 905.176821] ? printk+0xaa/0xca [ 905.180075] ? show_regs_print_info+0x18/0x18 [ 905.184546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 905.189364] do_invalid_op+0x1b/0x20 [ 905.193095] invalid_op+0x1b/0x40 [ 905.196526] RIP: 0010:refcount_inc+0x47/0x50 [ 905.200906] RSP: 0018:ffff88019f0af860 EFLAGS: 00010286 [ 905.206252] RAX: dffffc0000000008 RBX: ffff88019f10e204 RCX: ffffffff815b421e [ 905.213504] RDX: 0000000000000000 RSI: 1ffff10033e15ebc RDI: 1ffff10033e15e91 [ 905.220753] RBP: ffff88019f0af868 R08: 0000000000000000 R09: 0000000000000000 [ 905.228022] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88019f0afaf8 [ 905.235282] R13: ffff8801d88e3513 R14: ffff88019f10e200 R15: ffff8801d88e3501 [ 905.242552] ? vprintk_func+0x5e/0xc0 [ 905.246344] sk_alloc+0x3f9/0x1440 [ 905.249863] ? sock_def_error_report+0x5e0/0x5e0 [ 905.254591] ? __raw_spin_lock_init+0x2d/0x100 [ 905.259148] ? trace_hardirqs_off+0x10/0x10 [ 905.263440] ? do_raw_write_unlock+0x290/0x290 [ 905.267995] ? trace_hardirqs_off+0x10/0x10 [ 905.272292] ? __raw_spin_lock_init+0x1c/0x100 [ 905.276849] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 905.281847] ? find_held_lock+0x35/0x1d0 [ 905.285894] ? inet_create+0x3fc/0xf50 [ 905.289755] ? lock_downgrade+0x980/0x980 [ 905.293877] ? lock_release+0xa40/0xa40 [ 905.297826] ? lock_downgrade+0x980/0x980 [ 905.301953] inet_create+0x47c/0xf50 [ 905.305647] ? ipip_gro_receive+0xf0/0xf0 [ 905.309769] ? __lock_is_held+0xb6/0x140 [ 905.313820] __sock_create+0x4d4/0x850 [ 905.317684] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 905.322600] ? user_path_create+0x40/0x40 [ 905.326726] SyS_socket+0xeb/0x1d0 [ 905.330249] ? fillonedir+0x250/0x250 [ 905.334036] ? move_addr_to_kernel+0x60/0x60 [ 905.338429] ? getname_flags+0x256/0x580 [ 905.342470] ? do_syscall_64+0xb7/0x940 [ 905.346419] ? move_addr_to_kernel+0x60/0x60 [ 905.350799] do_syscall_64+0x281/0x940 [ 905.354664] ? vmalloc_sync_all+0x30/0x30 [ 905.358791] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 905.364312] ? syscall_return_slowpath+0x550/0x550 [ 905.369216] ? syscall_return_slowpath+0x2ac/0x550 [ 905.374120] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 905.379464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 905.384291] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 905.389461] RIP: 0033:0x4579a7 [ 905.392625] RSP: 002b:00007fffe297e088 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 905.400308] RAX: ffffffffffffffda RBX: 0000000000001255 RCX: 00000000004579a7 [ 905.407553] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 905.414799] RBP: 00000000000dcf1b R08: 0000000000000000 R09: 0000000000000001 [ 905.422045] R10: 000000000000000a R11: 0000000000000202 R12: 00000000000024c8 [ 905.429298] R13: 0000000000000017 R14: 00000000000024c8 R15: 00000000000dcc1a [ 905.437138] Dumping ftrace buffer: [ 905.440765] (ftrace buffer empty) [ 905.444448] Kernel Offset: disabled [ 905.448051] Rebooting in 86400 seconds..