, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a80669159", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:42 executing program 1 (fault-call:15 fault-nth:35): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 341.797813] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 341.805059] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 341.812306] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 341.819553] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 2018/03/30 02:11:42 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f8") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:42 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:42 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "31aa3b7d48b15dab523ff6150ff227df61f81ccd93890fe44068ffd6ac2e52a3e4f6d2711d4d1f6ea4bc8dca9a08a63a1a85366a6be9eeffb11b532a3b71e8c3385bbb995130ca1f5b1914a6668de538cd85f50112147df3ba9fdd33a9116201ed7cb6b5a46799ce8d9de5e8b52e0b779eda5b8dd40dd6ba3ae6a3b33108384f88ba48c8548945a183926cb3614cd81f481fd283b803638e7b56a54c009e3ff6c9dbb85cd0a8a9adbde815ac92c77dad1ecd06f0aabf950fa11832b8c1d994488b019c88c81c80c9ee9c0a8a6e5cdfba92cacb47c25c91ca921cb16d43d4069fdc30f225bf80d712a7fb2a853a6344417a8b5e9e7774f13dc9e2740a863c"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a80669159", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:42 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000042000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg(r0, &(0x7f00000bc000)={0x0, 0x0, &(0x7f0000baa000), 0x0, &(0x7f00004f9b78)}, 0x0) 2018/03/30 02:11:42 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x0, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 341.966626] FAULT_INJECTION: forcing a failure. [ 341.966626] name failslab, interval 1, probability 0, space 0, times 0 [ 341.977929] CPU: 0 PID: 19563 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 341.985200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.994541] Call Trace: [ 341.997119] dump_stack+0x194/0x24d [ 342.000743] ? arch_local_irq_restore+0x53/0x53 [ 342.005407] ? __save_stack_trace+0x7e/0xd0 [ 342.009740] should_fail+0x8c0/0xa40 [ 342.013452] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.018555] ? kasan_kmalloc+0xad/0xe0 [ 342.022436] ? kmem_cache_alloc_trace+0x136/0x740 [ 342.027270] ? __memcg_init_list_lru_node+0x169/0x270 [ 342.032446] ? __list_lru_init+0x544/0x750 [ 342.036665] ? sget_userns+0x6b1/0xe40 [ 342.040546] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 342.045295] ? do_mount+0xea4/0x2bb0 [ 342.048999] ? SyS_mount+0xab/0x120 [ 342.052621] ? do_syscall_64+0x281/0x940 [ 342.056674] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.062039] ? find_held_lock+0x35/0x1d0 [ 342.066106] ? __lock_is_held+0xb6/0x140 [ 342.070182] ? check_same_owner+0x320/0x320 [ 342.074501] ? rcu_note_context_switch+0x710/0x710 [ 342.079439] should_failslab+0xec/0x120 [ 342.083411] kmem_cache_alloc_trace+0x4b/0x740 [ 342.087986] ? __kmalloc_node+0x33/0x70 [ 342.091952] ? __kmalloc_node+0x33/0x70 [ 342.095918] ? rcu_read_lock_sched_held+0x108/0x120 [ 342.100930] __memcg_init_list_lru_node+0x169/0x270 [ 342.105947] ? list_lru_add+0x7c0/0x7c0 [ 342.109910] ? __kmalloc_node+0x47/0x70 [ 342.113886] __list_lru_init+0x544/0x750 [ 342.117951] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 342.123833] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 342.128855] ? lockdep_init_map+0x9/0x10 [ 342.132908] sget_userns+0x6b1/0xe40 [ 342.136607] ? set_anon_super+0x20/0x20 [ 342.140576] ? put_filp+0x90/0x90 [ 342.144022] ? destroy_unused_super.part.6+0xd0/0xd0 [ 342.149112] ? alloc_vfsmnt+0x762/0x9c0 [ 342.153077] ? path_lookupat+0x238/0xba0 [ 342.157129] ? mnt_free_id.isra.21+0x50/0x50 [ 342.161531] ? trace_hardirqs_off+0x10/0x10 [ 342.165845] ? putname+0xee/0x130 [ 342.169295] ? cap_capable+0x1b5/0x230 [ 342.173181] ? security_capable+0x8e/0xc0 [ 342.177325] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 342.182503] ? ns_capable_common+0xcf/0x160 [ 342.186821] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 342.191999] mount_ns+0x6d/0x190 [ 342.195360] rpc_mount+0x9e/0xd0 [ 342.198721] mount_fs+0x66/0x2d0 [ 342.202091] vfs_kern_mount.part.26+0xc6/0x4a0 [ 342.206664] ? may_umount+0xa0/0xa0 [ 342.210279] ? _raw_read_unlock+0x22/0x30 [ 342.214415] ? __get_fs_type+0x8a/0xc0 [ 342.218301] do_mount+0xea4/0x2bb0 [ 342.221824] ? __might_fault+0x110/0x1d0 [ 342.225883] ? copy_mount_string+0x40/0x40 [ 342.230107] ? check_same_owner+0x320/0x320 [ 342.234416] ? __check_object_size+0x8b/0x530 [ 342.238912] ? __might_sleep+0x95/0x190 [ 342.242886] ? kasan_check_write+0x14/0x20 [ 342.247106] ? _copy_from_user+0x99/0x110 [ 342.251252] ? memdup_user+0x5e/0x90 [ 342.254951] ? copy_mount_options+0x1f7/0x2e0 [ 342.259441] SyS_mount+0xab/0x120 [ 342.262884] ? copy_mnt_ns+0xb30/0xb30 [ 342.266762] do_syscall_64+0x281/0x940 [ 342.270633] ? __do_page_fault+0xc90/0xc90 [ 342.274853] ? _raw_spin_unlock_irq+0x27/0x70 [ 342.279335] ? finish_task_switch+0x1c1/0x7e0 [ 342.283823] ? syscall_return_slowpath+0x550/0x550 [ 342.288741] ? syscall_return_slowpath+0x2ac/0x550 [ 342.293658] ? prepare_exit_to_usermode+0x350/0x350 [ 342.298668] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 342.304031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.308879] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 342.314057] RIP: 0033:0x4548b9 [ 342.317241] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 342.324936] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 342.332189] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 342.339458] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 342.346711] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 342.353965] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000023 [ 342.788910] IPVS: ftp: loaded support on port[0] = 21 [ 342.817795] cgroup: cgroup2: unknown option "./file0/" 2018/03/30 02:11:43 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded", 0x1b}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) 2018/03/30 02:11:43 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:43 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0xfffffffffffffd60) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000d80)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000d40)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000dc0)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:43 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0xa, 0x1, 0xfff}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0}, 0xfffffffffffffc99) 2018/03/30 02:11:43 executing program 1 (fault-call:15 fault-nth:36): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:43 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 342.960957] FAULT_INJECTION: forcing a failure. [ 342.960957] name failslab, interval 1, probability 0, space 0, times 0 [ 342.972431] CPU: 1 PID: 19596 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 342.979701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.989035] Call Trace: [ 342.991609] dump_stack+0x194/0x24d [ 342.995234] ? arch_local_irq_restore+0x53/0x53 [ 342.999886] ? __save_stack_trace+0x7e/0xd0 [ 343.004191] should_fail+0x8c0/0xa40 [ 343.007883] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.012977] ? kasan_kmalloc+0xad/0xe0 [ 343.016847] ? kmem_cache_alloc_trace+0x136/0x740 [ 343.021668] ? __memcg_init_list_lru_node+0x169/0x270 [ 343.026832] ? __list_lru_init+0x544/0x750 [ 343.031041] ? sget_userns+0x6b1/0xe40 [ 343.034905] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 343.039649] ? do_mount+0xea4/0x2bb0 [ 343.043345] ? SyS_mount+0xab/0x120 [ 343.046949] ? do_syscall_64+0x281/0x940 [ 343.050989] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.056352] ? find_held_lock+0x35/0x1d0 [ 343.060403] ? __lock_is_held+0xb6/0x140 [ 343.064452] ? check_same_owner+0x320/0x320 [ 343.068750] ? rcu_note_context_switch+0x710/0x710 [ 343.073671] should_failslab+0xec/0x120 [ 343.077620] kmem_cache_alloc_trace+0x4b/0x740 [ 343.082174] ? __kmalloc_node+0x33/0x70 [ 343.086129] ? __kmalloc_node+0x33/0x70 [ 343.090089] ? rcu_read_lock_sched_held+0x108/0x120 [ 343.095094] __memcg_init_list_lru_node+0x169/0x270 [ 343.100086] ? list_lru_add+0x7c0/0x7c0 [ 343.104044] ? __kmalloc_node+0x47/0x70 [ 343.108000] __list_lru_init+0x544/0x750 [ 343.112059] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 343.117924] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 343.122927] ? lockdep_init_map+0x9/0x10 [ 343.126964] sget_userns+0x6b1/0xe40 [ 343.130656] ? set_anon_super+0x20/0x20 [ 343.134614] ? put_filp+0x90/0x90 [ 343.138044] ? destroy_unused_super.part.6+0xd0/0xd0 [ 343.143123] ? alloc_vfsmnt+0x762/0x9c0 [ 343.147071] ? path_lookupat+0x238/0xba0 [ 343.151107] ? mnt_free_id.isra.21+0x50/0x50 [ 343.155493] ? trace_hardirqs_off+0x10/0x10 [ 343.159789] ? putname+0xee/0x130 [ 343.163219] ? cap_capable+0x1b5/0x230 [ 343.167100] ? security_capable+0x8e/0xc0 [ 343.171234] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 343.176395] ? ns_capable_common+0xcf/0x160 [ 343.180691] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 343.185856] mount_ns+0x6d/0x190 [ 343.189203] rpc_mount+0x9e/0xd0 [ 343.192546] mount_fs+0x66/0x2d0 [ 343.195890] vfs_kern_mount.part.26+0xc6/0x4a0 [ 343.200452] ? may_umount+0xa0/0xa0 [ 343.204061] ? _raw_read_unlock+0x22/0x30 [ 343.208183] ? __get_fs_type+0x8a/0xc0 [ 343.212052] do_mount+0xea4/0x2bb0 [ 343.215564] ? __might_fault+0x110/0x1d0 [ 343.219602] ? copy_mount_string+0x40/0x40 [ 343.223808] ? check_same_owner+0x320/0x320 [ 343.228104] ? __check_object_size+0x8b/0x530 [ 343.232578] ? __might_sleep+0x95/0x190 [ 343.236533] ? kasan_check_write+0x14/0x20 [ 343.240750] ? _copy_from_user+0x99/0x110 [ 343.244883] ? memdup_user+0x5e/0x90 [ 343.248569] ? copy_mount_options+0x1f7/0x2e0 [ 343.253048] SyS_mount+0xab/0x120 [ 343.256476] ? copy_mnt_ns+0xb30/0xb30 [ 343.260337] do_syscall_64+0x281/0x940 [ 343.264197] ? __do_page_fault+0xc90/0xc90 [ 343.268402] ? _raw_spin_unlock_irq+0x27/0x70 [ 343.272868] ? finish_task_switch+0x1c1/0x7e0 [ 343.277340] ? syscall_return_slowpath+0x550/0x550 [ 343.282245] ? syscall_return_slowpath+0x2ac/0x550 [ 343.287147] ? prepare_exit_to_usermode+0x350/0x350 [ 343.292138] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 343.297483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.302317] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.307485] RIP: 0033:0x4548b9 2018/03/30 02:11:44 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded", 0x1b}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) 2018/03/30 02:11:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 6: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ncpfs\x00', 0x2000000, 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='overlay\x00', 0x4, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x102) 2018/03/30 02:11:44 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 343.310646] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 343.318325] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 343.325566] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 343.332806] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.340051] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 343.347294] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000024 2018/03/30 02:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 1 (fault-call:15 fault-nth:37): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 343.423187] overlayfs: missing 'lowerdir' [ 343.432555] overlayfs: missing 'lowerdir' [ 343.433781] FAULT_INJECTION: forcing a failure. [ 343.433781] name failslab, interval 1, probability 0, space 0, times 0 [ 343.447995] CPU: 1 PID: 19616 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 343.455256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.464584] Call Trace: [ 343.467153] dump_stack+0x194/0x24d [ 343.470763] ? arch_local_irq_restore+0x53/0x53 [ 343.475409] ? __save_stack_trace+0x7e/0xd0 [ 343.479718] should_fail+0x8c0/0xa40 [ 343.483410] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.488489] ? kasan_kmalloc+0xad/0xe0 [ 343.492349] ? kmem_cache_alloc_trace+0x136/0x740 [ 343.497166] ? __memcg_init_list_lru_node+0x169/0x270 [ 343.502328] ? __list_lru_init+0x544/0x750 [ 343.506538] ? sget_userns+0x6b1/0xe40 [ 343.510402] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 343.515134] ? do_mount+0xea4/0x2bb0 [ 343.518819] ? SyS_mount+0xab/0x120 [ 343.522424] ? do_syscall_64+0x281/0x940 [ 343.526461] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.531806] ? find_held_lock+0x35/0x1d0 [ 343.535851] ? __lock_is_held+0xb6/0x140 [ 343.539903] ? check_same_owner+0x320/0x320 [ 343.544205] ? rcu_note_context_switch+0x710/0x710 [ 343.549120] should_failslab+0xec/0x120 [ 343.553071] kmem_cache_alloc_trace+0x4b/0x740 [ 343.557628] ? __kmalloc_node+0x33/0x70 [ 343.561575] ? __kmalloc_node+0x33/0x70 [ 343.565526] ? rcu_read_lock_sched_held+0x108/0x120 [ 343.570527] __memcg_init_list_lru_node+0x169/0x270 [ 343.575522] ? list_lru_add+0x7c0/0x7c0 [ 343.579473] ? __kmalloc_node+0x47/0x70 [ 343.583431] __list_lru_init+0x544/0x750 [ 343.587478] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 343.593338] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 343.598337] ? lockdep_init_map+0x9/0x10 [ 343.602374] sget_userns+0x6b1/0xe40 [ 343.606062] ? set_anon_super+0x20/0x20 [ 343.610024] ? put_filp+0x90/0x90 [ 343.613456] ? destroy_unused_super.part.6+0xd0/0xd0 [ 343.618532] ? alloc_vfsmnt+0x762/0x9c0 [ 343.622479] ? path_lookupat+0x238/0xba0 [ 343.626517] ? mnt_free_id.isra.21+0x50/0x50 [ 343.630906] ? trace_hardirqs_off+0x10/0x10 [ 343.635204] ? putname+0xee/0x130 [ 343.638638] ? cap_capable+0x1b5/0x230 [ 343.642506] ? security_capable+0x8e/0xc0 [ 343.646633] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 343.651797] ? ns_capable_common+0xcf/0x160 [ 343.656099] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 343.661263] mount_ns+0x6d/0x190 [ 343.664608] rpc_mount+0x9e/0xd0 [ 343.667954] mount_fs+0x66/0x2d0 [ 343.671301] vfs_kern_mount.part.26+0xc6/0x4a0 [ 343.675859] ? may_umount+0xa0/0xa0 [ 343.679462] ? _raw_read_unlock+0x22/0x30 [ 343.683584] ? __get_fs_type+0x8a/0xc0 [ 343.687455] do_mount+0xea4/0x2bb0 [ 343.690970] ? __might_fault+0x110/0x1d0 [ 343.695020] ? copy_mount_string+0x40/0x40 [ 343.699235] ? check_same_owner+0x320/0x320 [ 343.703531] ? __check_object_size+0x8b/0x530 [ 343.708016] ? __might_sleep+0x95/0x190 [ 343.711976] ? kasan_check_write+0x14/0x20 [ 343.716185] ? _copy_from_user+0x99/0x110 [ 343.720313] ? memdup_user+0x5e/0x90 [ 343.724003] ? copy_mount_options+0x1f7/0x2e0 [ 343.728486] SyS_mount+0xab/0x120 [ 343.731911] ? copy_mnt_ns+0xb30/0xb30 [ 343.735774] do_syscall_64+0x281/0x940 [ 343.739634] ? __do_page_fault+0xc90/0xc90 [ 343.743842] ? _raw_spin_unlock_irq+0x27/0x70 [ 343.748310] ? finish_task_switch+0x1c1/0x7e0 [ 343.752782] ? syscall_return_slowpath+0x550/0x550 [ 343.757688] ? syscall_return_slowpath+0x2ac/0x550 [ 343.762594] ? prepare_exit_to_usermode+0x350/0x350 [ 343.767587] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 343.772932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.777756] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 343.782920] RIP: 0033:0x4548b9 [ 343.786085] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 343.793766] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 343.801015] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 343.808264] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 343.815506] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 02:11:44 executing program 6: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000a80)={r0, &(0x7f0000000c00)="2e9cef96175c3bab7186cc4405d458fa72958412f30766d2a18af77bee4540b17f9ece75f049463be103701d1e92d56124a0a2ac15cf143ecbe395339bf8125707a5b5d101eff047c1bbc107bc0ed5fa9b2a613c483890082e3fa35ff85cbf54602e7cb28d087171b9a2119c10d844adf50e73daadea3f7e4d157f54864773d5dc7e9b0288f7d4e4b3c65f4a7341f47bd2b48d7c7860dc0eb5e0a48df3494990a03649cd1e9743fe5ec6769f563f15f5457716a717732635d8a05469ff602e27b9a18c0d3edb1297ffaa68b6ebb0669139aeeaa2077f060b60522f1e454fe2368ce59a0ffff0a09c5510", &(0x7f0000000d00)=""/212}, 0x18) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x0, 0xaa2, 0x613, 0x4}, 0x3f}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x0, 0x3f, 0x8, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xb, 0x2, &(0x7f0000000980)=ANY=[@ANYBLOB="1800000000000000000000000000000018100000"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x30, &(0x7f0000000640)=""/48, 0x41f00, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r0}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r1}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") 2018/03/30 02:11:44 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 343.822750] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000025 2018/03/30 02:11:44 executing program 1 (fault-call:15 fault-nth:38): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x0, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:44 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000d40)="48826af5290ebe80907217132fb0696b0d154ff06e988dbab8bd84eb4823b41c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc47632eb331dc05d82c0306df7d6c5949b0cbc8bacf26d9e78aff0e14c39021b8b0100457a825384502bf512850360ba9a6389257dc1594c40b1fce19685517c642624bb614fc1a9209af411614c062a41d99f4b6222b1e8a685aa771af4bbcb83dd3f892a71f307d1cd9e78c2da7fe1d4675ae89678a3d1eae55cfe56c51d57929d5c8e378fde52acd9ad", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 343.948837] FAULT_INJECTION: forcing a failure. [ 343.948837] name failslab, interval 1, probability 0, space 0, times 0 [ 343.960131] CPU: 1 PID: 19644 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 343.967395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.976744] Call Trace: [ 343.979357] dump_stack+0x194/0x24d [ 343.982993] ? arch_local_irq_restore+0x53/0x53 [ 343.987656] ? __save_stack_trace+0x7e/0xd0 [ 343.991992] should_fail+0x8c0/0xa40 [ 343.995701] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 344.000797] ? kasan_kmalloc+0xad/0xe0 [ 344.004672] ? kmem_cache_alloc_trace+0x136/0x740 [ 344.009503] ? __memcg_init_list_lru_node+0x169/0x270 [ 344.014676] ? __list_lru_init+0x544/0x750 [ 344.018895] ? sget_userns+0x6b1/0xe40 [ 344.022772] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 344.027531] ? do_mount+0xea4/0x2bb0 [ 344.031237] ? SyS_mount+0xab/0x120 [ 344.034853] ? do_syscall_64+0x281/0x940 [ 344.038904] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.044265] ? find_held_lock+0x35/0x1d0 [ 344.048323] ? __lock_is_held+0xb6/0x140 [ 344.052398] ? check_same_owner+0x320/0x320 [ 344.056718] ? rcu_note_context_switch+0x710/0x710 [ 344.061649] should_failslab+0xec/0x120 [ 344.065610] kmem_cache_alloc_trace+0x4b/0x740 [ 344.070206] __memcg_init_list_lru_node+0x169/0x270 [ 344.075221] ? list_lru_add+0x7c0/0x7c0 [ 344.079182] ? __kmalloc_node+0x47/0x70 [ 344.083161] __list_lru_init+0x544/0x750 [ 344.087223] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 344.093100] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 344.098118] ? lockdep_init_map+0x9/0x10 [ 344.102176] sget_userns+0x6b1/0xe40 [ 344.105875] ? set_anon_super+0x20/0x20 [ 344.109854] ? put_filp+0x90/0x90 [ 344.113309] ? destroy_unused_super.part.6+0xd0/0xd0 [ 344.118403] ? alloc_vfsmnt+0x762/0x9c0 [ 344.122362] ? path_lookupat+0x238/0xba0 [ 344.126414] ? mnt_free_id.isra.21+0x50/0x50 [ 344.130816] ? trace_hardirqs_off+0x10/0x10 [ 344.135129] ? putname+0xee/0x130 [ 344.138576] ? cap_capable+0x1b5/0x230 [ 344.142459] ? security_capable+0x8e/0xc0 [ 344.146600] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 344.151774] ? ns_capable_common+0xcf/0x160 [ 344.156096] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 344.161272] mount_ns+0x6d/0x190 [ 344.164633] rpc_mount+0x9e/0xd0 [ 344.167993] mount_fs+0x66/0x2d0 [ 344.171356] vfs_kern_mount.part.26+0xc6/0x4a0 [ 344.175931] ? may_umount+0xa0/0xa0 [ 344.179550] ? _raw_read_unlock+0x22/0x30 [ 344.183685] ? __get_fs_type+0x8a/0xc0 [ 344.187571] do_mount+0xea4/0x2bb0 [ 344.191095] ? __might_fault+0x110/0x1d0 [ 344.195158] ? copy_mount_string+0x40/0x40 [ 344.199383] ? check_same_owner+0x320/0x320 [ 344.203704] ? __check_object_size+0x8b/0x530 [ 344.208206] ? __might_sleep+0x95/0x190 [ 344.212184] ? kasan_check_write+0x14/0x20 [ 344.216413] ? _copy_from_user+0x99/0x110 [ 344.220558] ? memdup_user+0x5e/0x90 [ 344.224266] ? copy_mount_options+0x1f7/0x2e0 [ 344.228760] SyS_mount+0xab/0x120 [ 344.232204] ? copy_mnt_ns+0xb30/0xb30 [ 344.236089] do_syscall_64+0x281/0x940 [ 344.239964] ? __do_page_fault+0xc90/0xc90 [ 344.244183] ? _raw_spin_unlock_irq+0x27/0x70 [ 344.248665] ? finish_task_switch+0x1c1/0x7e0 [ 344.253148] ? syscall_return_slowpath+0x550/0x550 [ 344.258070] ? syscall_return_slowpath+0x2ac/0x550 [ 344.262991] ? prepare_exit_to_usermode+0x350/0x350 [ 344.268001] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 344.273362] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.278207] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 344.283389] RIP: 0033:0x4548b9 [ 344.286568] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 344.294265] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 344.301524] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 344.308776] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 344.316034] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 344.323292] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000026 [ 344.780820] IPVS: ftp: loaded support on port[0] = 21 [ 344.810201] cgroup: cgroup2: unknown option "./file0/" 2018/03/30 02:11:45 executing program 6: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) socketpair(0xf, 0x80803, 0x20, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000200)=0x226e7b3) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007700)=""/62, 0x3e}], 0x4, 0x0, 0x0, 0x1f}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r4}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e", 0x3c}], 0x1, &(0x7f0000000640)}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x9, 0x0, 0x1}, 0x2c) r5 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x7ffffd, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000005fc0)={0x0, 0x0, &(0x7f0000000040)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x88, &(0x7f0000000140)=""/136}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000005dc0)={&(0x7f0000005b40)=@can={0x0, 0x0}, 0x80, &(0x7f0000005d80)=[{&(0x7f0000005bc0)=""/142, 0x8e}, {&(0x7f0000009040)=""/4096, 0x1000}, {&(0x7f0000005c80)=""/240, 0xf0}], 0x3, 0x0, 0x0, 0x7}, 0x2000) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r1, 0xffffffffffffff80, 0x25adc37b81912f4b}, 0xc) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000005e00)={0xf, 0x4, &(0x7f0000000500)=@raw=[@exit={0x95}, @alu={0x7, 0x4, 0x0, 0xd, 0x0, 0x98}], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x4b, &(0x7f0000000580)=""/75, 0x41f00, 0x1, [], r6}, 0x48) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000005680)={&(0x7f00000043c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000005540)=[{&(0x7f0000004440)=""/4096, 0x1000}, {&(0x7f0000005440)=""/218, 0xda}], 0x2, &(0x7f0000005580)=""/253, 0xfd, 0x5}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000056c0)={0x7, 0x2, &(0x7f00000000c0)=@raw=[@jmp={0x5, 0x7fffffff, 0x6, 0x1, 0xa, 0xfffffffe, 0xfffffffffffffffd}], &(0x7f0000000100)='syzkaller\x00', 0xf8e, 0xe7, &(0x7f0000000200)=""/231, 0x41f00, 0x1, [], r9}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000640)={r7, &(0x7f0000000680)="2557ef1d52338af3b7ea37c71541630a146591f89b8b214d90538710d9194778e5212f533820449d3c053cae3b35194f4ac938b0fb424feab1d366110e477cc111e9c15985fc964580fbff1d62897a4cab90bb530b4a13134e59b2f9c96d96b7abbf5aa9114df8c685d42e4ab9c84f57cf589aebbfe696a70e4bdee9f62300000000000000f2efd8a7007c866ae23e185e64", &(0x7f0000000ac0)="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", 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1f, 0xbb, 0x7, 0x80000001, 0x1c, r5, 0x10001}, 0x2c) close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f00000007c0)='./file1\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00'}, 0x10) close(r8) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db420", 0x22}], 0x1, &(0x7f0000000980)}, 0x20000000) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00), 0x0, &(0x7f0000006d40)=""/65, 0x41}, 0x0) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000380), 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000540)={&(0x7f0000000340)='./file1\x00', r10}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x401, 0x4, 0x2, 0x0, 0x0, 0xfffffffffffffffc}, @exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) 2018/03/30 02:11:45 executing program 1 (fault-call:15 fault-nth:39): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:45 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0xfffffffffffffe56) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:45 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:45 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:45 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0a", 0x20}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) 2018/03/30 02:11:45 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0a", 0x20}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) [ 344.945797] FAULT_INJECTION: forcing a failure. [ 344.945797] name failslab, interval 1, probability 0, space 0, times 0 [ 344.957191] CPU: 0 PID: 19676 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 344.964464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.973812] Call Trace: [ 344.976405] dump_stack+0x194/0x24d [ 344.980033] ? arch_local_irq_restore+0x53/0x53 [ 344.984710] ? __save_stack_trace+0x7e/0xd0 [ 344.989034] should_fail+0x8c0/0xa40 [ 344.992734] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 344.997824] ? kasan_kmalloc+0xad/0xe0 [ 345.001686] ? kmem_cache_alloc_trace+0x136/0x740 [ 345.006512] ? __memcg_init_list_lru_node+0x169/0x270 [ 345.011676] ? __list_lru_init+0x544/0x750 [ 345.015884] ? sget_userns+0x6b1/0xe40 [ 345.019752] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 345.024491] ? do_mount+0xea4/0x2bb0 [ 345.028187] ? SyS_mount+0xab/0x120 [ 345.031787] ? do_syscall_64+0x281/0x940 [ 345.035823] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.041167] ? find_held_lock+0x35/0x1d0 [ 345.045220] ? __lock_is_held+0xb6/0x140 [ 345.049271] ? check_same_owner+0x320/0x320 [ 345.053570] ? rcu_note_context_switch+0x710/0x710 [ 345.058483] should_failslab+0xec/0x120 [ 345.062444] kmem_cache_alloc_trace+0x4b/0x740 [ 345.067009] ? __kmalloc_node+0x33/0x70 [ 345.070961] ? __kmalloc_node+0x33/0x70 [ 345.074911] ? rcu_read_lock_sched_held+0x108/0x120 [ 345.079911] __memcg_init_list_lru_node+0x169/0x270 [ 345.084921] ? list_lru_add+0x7c0/0x7c0 [ 345.089121] ? __kmalloc_node+0x47/0x70 2018/03/30 02:11:45 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 345.093080] __list_lru_init+0x544/0x750 [ 345.097133] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 345.103015] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 345.108042] ? lockdep_init_map+0x9/0x10 [ 345.112103] sget_userns+0x6b1/0xe40 [ 345.115806] ? set_anon_super+0x20/0x20 [ 345.119789] ? put_filp+0x90/0x90 [ 345.123243] ? destroy_unused_super.part.6+0xd0/0xd0 [ 345.128338] ? alloc_vfsmnt+0x762/0x9c0 [ 345.132301] ? path_lookupat+0x238/0xba0 [ 345.136354] ? mnt_free_id.isra.21+0x50/0x50 [ 345.140757] ? trace_hardirqs_off+0x10/0x10 [ 345.145070] ? putname+0xee/0x130 [ 345.148519] ? cap_capable+0x1b5/0x230 [ 345.152406] ? security_capable+0x8e/0xc0 [ 345.156551] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 345.161727] ? ns_capable_common+0xcf/0x160 [ 345.166043] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 345.171220] mount_ns+0x6d/0x190 [ 345.174583] rpc_mount+0x9e/0xd0 [ 345.177944] mount_fs+0x66/0x2d0 [ 345.181312] vfs_kern_mount.part.26+0xc6/0x4a0 [ 345.185890] ? may_umount+0xa0/0xa0 [ 345.189512] ? _raw_read_unlock+0x22/0x30 [ 345.193647] ? __get_fs_type+0x8a/0xc0 [ 345.197534] do_mount+0xea4/0x2bb0 [ 345.201064] ? __might_fault+0x110/0x1d0 [ 345.205132] ? copy_mount_string+0x40/0x40 [ 345.209366] ? check_same_owner+0x320/0x320 [ 345.213678] ? __check_object_size+0x8b/0x530 [ 345.218178] ? __might_sleep+0x95/0x190 [ 345.222153] ? kasan_check_write+0x14/0x20 [ 345.226379] ? _copy_from_user+0x99/0x110 [ 345.230523] ? memdup_user+0x5e/0x90 [ 345.234230] ? copy_mount_options+0x1f7/0x2e0 [ 345.238725] SyS_mount+0xab/0x120 [ 345.242174] ? copy_mnt_ns+0xb30/0xb30 [ 345.246058] do_syscall_64+0x281/0x940 [ 345.249936] ? __do_page_fault+0xc90/0xc90 [ 345.254160] ? _raw_spin_unlock_irq+0x27/0x70 [ 345.258646] ? finish_task_switch+0x1c1/0x7e0 [ 345.263139] ? syscall_return_slowpath+0x550/0x550 [ 345.268063] ? syscall_return_slowpath+0x2ac/0x550 [ 345.272984] ? prepare_exit_to_usermode+0x350/0x350 [ 345.277994] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 345.283357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.288192] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.293354] RIP: 0033:0x4548b9 2018/03/30 02:11:46 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 345.296518] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 345.304198] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 345.311439] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 345.318681] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 345.325924] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 345.333166] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000027 2018/03/30 02:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:46 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf5006", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:46 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x4, 0x7, 0xa, 0x0, 0x18, 0x1}], {0x95}}, &(0x7f0000000280)='syzkaller\x00', 0xff, 0xab, &(0x7f00000002c0)=""/171, 0x41100, 0x1}, 0x48) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="feffffffffffffff00000000000028de20faa66d6300000000950000ba16158178e8b16900000000000000000000004447bd124021c2a7243cbae79f834df661bc036582f20ae28a90edc18d8d392e2a468447c5928c84d8d934e8942fa0ae6edcda751c6923ae14b742f7797c3b8d24f409643ca41ce47a8f3347ee9a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0x259, &(0x7f0000386000)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x6e, &(0x7f0000000080)="3447f36cbc3563", &(0x7f00000000c0)=""/110}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0x0, 0x0}) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4982, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) close(r2) recvmsg(r1, &(0x7f0000005180)={&(0x7f0000004ac0)=@can, 0x10, &(0x7f0000000800), 0x1f0, &(0x7f0000000040)=""/93, 0xfffffffffffffc1c}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x1a9, &(0x7f0000000b40)=""/251}, 0x15) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='fuseblk\x00', 0x0, &(0x7f0000000100)) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f00000007c0)={&(0x7f0000000140)=@pppoe={0x18, 0x0, {0x3, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'ip_vti0\x00'}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000001c0)="7726d56bf8f8907b663c07d9697287a472b3a307df44177e59bb7bc152e3984c2897bea7f29ab2de6024da59924673eb37b421b0084a", 0x36}], 0x1, 0x0, 0x0, 0x4000010}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r3, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=r5, 0x4) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', r6}, 0x10) 2018/03/30 02:11:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0xfffffffffffffff7, 0x6, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x40000010}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0xfffffc, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:46 executing program 1 (fault-call:15 fault-nth:40): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 345.435793] FAULT_INJECTION: forcing a failure. [ 345.435793] name failslab, interval 1, probability 0, space 0, times 0 [ 345.447099] CPU: 0 PID: 19723 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 345.454360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.463689] Call Trace: [ 345.466258] dump_stack+0x194/0x24d [ 345.469874] ? arch_local_irq_restore+0x53/0x53 [ 345.474519] ? __save_stack_trace+0x7e/0xd0 [ 345.478839] should_fail+0x8c0/0xa40 [ 345.482534] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 345.487616] ? kasan_kmalloc+0xad/0xe0 [ 345.491477] ? kmem_cache_alloc_trace+0x136/0x740 [ 345.496296] ? __memcg_init_list_lru_node+0x169/0x270 [ 345.501460] ? __list_lru_init+0x544/0x750 [ 345.505667] ? sget_userns+0x6b1/0xe40 [ 345.509534] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 345.514262] ? do_mount+0xea4/0x2bb0 [ 345.517951] ? SyS_mount+0xab/0x120 [ 345.521554] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.526906] ? find_held_lock+0x35/0x1d0 [ 345.530955] ? __lock_is_held+0xb6/0x140 [ 345.535026] ? check_same_owner+0x320/0x320 [ 345.539337] ? rcu_note_context_switch+0x710/0x710 [ 345.544255] should_failslab+0xec/0x120 [ 345.548209] kmem_cache_alloc_trace+0x4b/0x740 [ 345.552767] ? __kmalloc_node+0x33/0x70 [ 345.556721] ? __kmalloc_node+0x33/0x70 [ 345.560673] ? rcu_read_lock_sched_held+0x108/0x120 [ 345.565674] __memcg_init_list_lru_node+0x169/0x270 [ 345.570674] ? list_lru_add+0x7c0/0x7c0 [ 345.574625] ? __kmalloc_node+0x47/0x70 [ 345.578588] __list_lru_init+0x544/0x750 [ 345.582634] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 345.588499] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 345.593504] ? lockdep_init_map+0x9/0x10 [ 345.597548] sget_userns+0x6b1/0xe40 [ 345.601236] ? set_anon_super+0x20/0x20 [ 345.605196] ? put_filp+0x90/0x90 [ 345.608631] ? destroy_unused_super.part.6+0xd0/0xd0 [ 345.613708] ? alloc_vfsmnt+0x762/0x9c0 [ 345.617656] ? path_lookupat+0x238/0xba0 [ 345.621693] ? mnt_free_id.isra.21+0x50/0x50 [ 345.626088] ? trace_hardirqs_off+0x10/0x10 [ 345.630391] ? putname+0xee/0x130 [ 345.633828] ? cap_capable+0x1b5/0x230 [ 345.637703] ? security_capable+0x8e/0xc0 [ 345.641834] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 345.646997] ? ns_capable_common+0xcf/0x160 [ 345.651305] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 345.656468] mount_ns+0x6d/0x190 [ 345.659822] rpc_mount+0x9e/0xd0 [ 345.663173] mount_fs+0x66/0x2d0 [ 345.666524] vfs_kern_mount.part.26+0xc6/0x4a0 [ 345.671089] ? may_umount+0xa0/0xa0 [ 345.674692] ? _raw_read_unlock+0x22/0x30 [ 345.678826] ? __get_fs_type+0x8a/0xc0 [ 345.682704] do_mount+0xea4/0x2bb0 [ 345.686218] ? __might_fault+0x110/0x1d0 [ 345.690271] ? copy_mount_string+0x40/0x40 [ 345.694487] ? __check_object_size+0x8b/0x530 [ 345.698975] ? __might_sleep+0x95/0x190 [ 345.702939] ? kasan_check_write+0x14/0x20 [ 345.707154] ? _copy_from_user+0x99/0x110 [ 345.711288] ? memdup_user+0x5e/0x90 [ 345.714979] ? copy_mount_options+0x1f7/0x2e0 [ 345.719460] SyS_mount+0xab/0x120 [ 345.722890] ? copy_mnt_ns+0xb30/0xb30 [ 345.726759] do_syscall_64+0x281/0x940 [ 345.730625] ? __do_page_fault+0xc90/0xc90 [ 345.734840] ? _raw_spin_unlock_irq+0x27/0x70 [ 345.739311] ? finish_task_switch+0x1c1/0x7e0 [ 345.743788] ? syscall_return_slowpath+0x550/0x550 [ 345.748699] ? syscall_return_slowpath+0x2ac/0x550 [ 345.753607] ? prepare_exit_to_usermode+0x350/0x350 [ 345.758604] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 345.763954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.768791] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.773956] RIP: 0033:0x4548b9 [ 345.777121] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 02:11:46 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf5006", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:46 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x0, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:46 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 345.784805] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 345.792052] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 345.799295] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 345.806551] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 345.813800] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000028 2018/03/30 02:11:46 executing program 1 (fault-call:15 fault-nth:41): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:46 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf5006", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:46 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)={0x7, 0x81, 0xfb, 0x20002, 0x11, r0, 0x4000000000004}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r0, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0xfffffffffffffc9d) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={r4, 0x100000001, 0x16}, 0xfffffea4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000a80)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000d00)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000001140)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 345.954514] FAULT_INJECTION: forcing a failure. [ 345.954514] name failslab, interval 1, probability 0, space 0, times 0 [ 345.965826] CPU: 0 PID: 19745 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 345.973085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.982421] Call Trace: [ 345.985002] dump_stack+0x194/0x24d [ 345.988625] ? arch_local_irq_restore+0x53/0x53 [ 345.993279] ? __save_stack_trace+0x7e/0xd0 [ 345.997603] should_fail+0x8c0/0xa40 [ 346.001315] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 346.006403] ? kasan_kmalloc+0xad/0xe0 [ 346.010274] ? kmem_cache_alloc_trace+0x136/0x740 [ 346.015102] ? __memcg_init_list_lru_node+0x169/0x270 [ 346.020278] ? __list_lru_init+0x544/0x750 [ 346.024495] ? sget_userns+0x6b1/0xe40 [ 346.028370] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 346.033108] ? do_mount+0xea4/0x2bb0 [ 346.036806] ? SyS_mount+0xab/0x120 [ 346.040415] ? do_syscall_64+0x281/0x940 [ 346.044461] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.050339] ? find_held_lock+0x35/0x1d0 [ 346.054401] ? __lock_is_held+0xb6/0x140 [ 346.058474] ? check_same_owner+0x320/0x320 [ 346.062790] ? rcu_note_context_switch+0x710/0x710 [ 346.067725] should_failslab+0xec/0x120 [ 346.071693] kmem_cache_alloc_trace+0x4b/0x740 [ 346.076262] ? __kmalloc_node+0x33/0x70 [ 346.080218] ? __kmalloc_node+0x33/0x70 [ 346.084178] ? rcu_read_lock_sched_held+0x108/0x120 [ 346.089190] __memcg_init_list_lru_node+0x169/0x270 [ 346.094202] ? list_lru_add+0x7c0/0x7c0 [ 346.098163] ? __kmalloc_node+0x47/0x70 [ 346.102136] __list_lru_init+0x544/0x750 [ 346.106192] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 346.112066] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 346.117081] ? lockdep_init_map+0x9/0x10 [ 346.121134] sget_userns+0x6b1/0xe40 [ 346.124835] ? set_anon_super+0x20/0x20 [ 346.128804] ? put_filp+0x90/0x90 [ 346.132245] ? destroy_unused_super.part.6+0xd0/0xd0 [ 346.137334] ? alloc_vfsmnt+0x762/0x9c0 [ 346.141292] ? path_lookupat+0x238/0xba0 [ 346.145342] ? mnt_free_id.isra.21+0x50/0x50 [ 346.149751] ? trace_hardirqs_off+0x10/0x10 [ 346.154061] ? putname+0xee/0x130 [ 346.157507] ? cap_capable+0x1b5/0x230 [ 346.161394] ? security_capable+0x8e/0xc0 [ 346.165533] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 346.170713] ? ns_capable_common+0xcf/0x160 [ 346.175030] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 346.180206] mount_ns+0x6d/0x190 [ 346.183565] rpc_mount+0x9e/0xd0 [ 346.186926] mount_fs+0x66/0x2d0 [ 346.190289] vfs_kern_mount.part.26+0xc6/0x4a0 [ 346.194860] ? may_umount+0xa0/0xa0 [ 346.198476] ? _raw_read_unlock+0x22/0x30 [ 346.202614] ? __get_fs_type+0x8a/0xc0 [ 346.206499] do_mount+0xea4/0x2bb0 [ 346.210023] ? __might_fault+0x110/0x1d0 [ 346.214083] ? copy_mount_string+0x40/0x40 [ 346.218306] ? check_same_owner+0x320/0x320 [ 346.222616] ? __check_object_size+0x8b/0x530 [ 346.227110] ? __might_sleep+0x95/0x190 [ 346.231081] ? kasan_check_write+0x14/0x20 [ 346.235301] ? _copy_from_user+0x99/0x110 [ 346.239441] ? memdup_user+0x5e/0x90 [ 346.243143] ? copy_mount_options+0x1f7/0x2e0 [ 346.247636] SyS_mount+0xab/0x120 [ 346.251074] ? copy_mnt_ns+0xb30/0xb30 [ 346.254952] do_syscall_64+0x281/0x940 [ 346.258834] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 346.264358] ? syscall_return_slowpath+0x550/0x550 [ 346.269274] ? syscall_return_slowpath+0x2ac/0x550 [ 346.274202] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 346.279562] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.284401] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.289572] RIP: 0033:0x4548b9 [ 346.292747] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 346.300445] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 346.307701] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 346.314961] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 346.322214] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 346.329469] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000029 [ 346.747392] IPVS: ftp: loaded support on port[0] = 21 [ 346.775999] cgroup: cgroup2: unknown option "./file0/" 2018/03/30 02:11:47 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838", 0x22}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) 2018/03/30 02:11:47 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:47 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:47 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:47 executing program 6: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x20000000) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[], 0x0, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480)="9b7815cd421eecc37df9250ab7496936ab4c75599ff96ba02ed5166be56df09fec2eef35318bf9b1311a", &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x4, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0x401, 0x4, 0x2, 0x8}, @exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) mkdir(&(0x7f0000000ac0)='./file1\x00', 0x40) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000640)='./file1\x00', 0x1) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x103fe, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) socketpair(0xe, 0x2, 0x6, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f00000019c0)="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", &(0x7f0000000b00)="991a7996219ba83ede335ea2454547ee19f837d41d328221559beeb187ccfe9cddcd344bb41a7072a447bfacb5567d54d6ef0650a9765f9112e030ac84bb60816fdc8dbb8a8b9febbada0f8184bd62fb1d1d3da4d8a5dcdbd5a1338c5598231c9f45de3f70c48908f7ccf7", 0x1}, 0x20) recvmsg(r0, &(0x7f0000003c40)={&(0x7f0000001500)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000003bc0)=[{&(0x7f0000001580)=""/187, 0xbb}, {&(0x7f0000001640)=""/202, 0xca}, {&(0x7f0000001740)=""/97, 0x61}, {&(0x7f00000017c0)=""/142, 0x8e}, {&(0x7f00000029c0)=""/172, 0xac}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/144, 0x90}, {&(0x7f0000003b40)=""/111, 0x6f}], 0x8, 0x0, 0x0, 0x800}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000003c80)={0xe, 0x9, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@generic={0x10001, 0x9, 0x0, 0x3}, @ldst={0x3, 0x3, 0x7, 0x0, 0x8, 0x0, 0x8}, @generic={0x0, 0x1ff, 0x623c7a4d, 0x6006730a}], {0x95}}, &(0x7f0000000980)='GPL\x00', 0x5, 0x84, &(0x7f00000009c0)=""/132, 0x0, 0x0, [], r3}, 0x48) mkdir(&(0x7f0000000a80)='./file0\x00', 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0x12, &(0x7f00000004c0)=@raw=[@exit={0x95}, @jmp={0x5, 0x7f, 0x9, 0x7, 0x0, 0x30, 0x570c72d2c4205df9}, @generic={0x401, 0xffffffffffffffc1, 0x8, 0x1}, @call={0x85, 0x0, 0x0, 0x38}, @ldst={0x1, 0x2, 0x34194f12a387f72c, 0x2, 0x3, 0xfffffffc, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x18}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x33}], &(0x7f0000000380)='syzkaller\x00', 0x7fff, 0xd, &(0x7f0000000580)=""/13, 0x40f00, 0x1}, 0x48) recvmsg(r1, &(0x7f0000001240)={&(0x7f0000000e40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000001180)=[{&(0x7f0000000c80)=""/21, 0x15}, {&(0x7f0000000ec0)=""/105, 0x69}, {&(0x7f0000000f40)=""/154, 0x9a}, {&(0x7f0000001000)=""/5, 0x5}, {&(0x7f0000001040)=""/15, 0xf}, {&(0x7f0000001080)=""/204, 0xcc}], 0x6, &(0x7f0000001200)=""/43, 0x2b, 0x6}, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0xf, 0xb, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0xffffffffffffff00}, [@ldst={0x3, 0x0, 0x6, 0xf, 0x7, 0xfffffff8, 0xfffffffffffffff0}, @exit={0x95}, @jmp={0x5, 0x8, 0x7, 0xf, 0x1, 0xfffffffe, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}], {0x95}}, &(0x7f0000000680)='syzkaller\x00', 0x304f, 0x41, &(0x7f0000000880)=""/65, 0x41100, 0x1, [], r4}, 0x48) 2018/03/30 02:11:47 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "31aa3b7d48b15dab523ff6150ff227df61f81ccd93890fe44068ffd6ac2e52a3e4f6d2711d4d1f6ea4bc8dca9a08a63a1a85366a6be9eeffb11b532a3b71e8c3385bbb995130ca1f5b1914a6668de538cd85f50112147df3ba9fdd33a9116201ed7cb6b5a46799ce8d9de5e8b52e0b779eda5b8dd40dd6ba3ae6a3b33108384f88ba48c8548945a183926cb3614cd81f481fd283b803638e7b56a54c009e3ff6c9dbb85cd0a8a9adbde815ac92c77dad1ecd06f0aabf950fa11832b8c1d994488b019c88c81c80c9ee9c0a8a6e5cdfba92cacb47c25c91ca921cb16d43d4069fdc30f225bf80d712a7fb2a853a6344417a8b5e9e7774f13dc9e2740a863c"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065c", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x8}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:47 executing program 1 (fault-call:15 fault-nth:42): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 346.911717] FAULT_INJECTION: forcing a failure. [ 346.911717] name failslab, interval 1, probability 0, space 0, times 0 [ 346.923095] CPU: 0 PID: 19772 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 346.924400] EXT4-fs (sda1): re-mounted. Opts: [ 346.930359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.930363] Call Trace: [ 346.930384] dump_stack+0x194/0x24d [ 346.930401] ? arch_local_irq_restore+0x53/0x53 [ 346.930412] ? __save_stack_trace+0x7e/0xd0 [ 346.959436] should_fail+0x8c0/0xa40 [ 346.963143] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 346.968236] ? kasan_kmalloc+0xad/0xe0 [ 346.972107] ? kmem_cache_alloc_trace+0x136/0x740 [ 346.976946] ? __memcg_init_list_lru_node+0x169/0x270 [ 346.982112] ? __list_lru_init+0x544/0x750 [ 346.986329] ? sget_userns+0x6b1/0xe40 [ 346.990212] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 346.994961] ? do_mount+0xea4/0x2bb0 [ 346.998665] ? SyS_mount+0xab/0x120 [ 347.002273] ? do_syscall_64+0x281/0x940 [ 347.002373] EXT4-fs (sda1): re-mounted. Opts: [ 347.006318] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.006342] ? find_held_lock+0x35/0x1d0 [ 347.006362] ? __lock_is_held+0xb6/0x140 [ 347.006396] ? check_same_owner+0x320/0x320 [ 347.006410] ? rcu_note_context_switch+0x710/0x710 [ 347.033601] should_failslab+0xec/0x120 [ 347.037563] kmem_cache_alloc_trace+0x4b/0x740 [ 347.042137] ? __kmalloc_node+0x33/0x70 [ 347.046102] ? __kmalloc_node+0x33/0x70 [ 347.050054] ? rcu_read_lock_sched_held+0x108/0x120 [ 347.055049] __memcg_init_list_lru_node+0x169/0x270 [ 347.060048] ? list_lru_add+0x7c0/0x7c0 [ 347.063999] ? __kmalloc_node+0x47/0x70 [ 347.067962] __list_lru_init+0x544/0x750 [ 347.072001] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 347.077872] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 347.082878] ? lockdep_init_map+0x9/0x10 [ 347.087156] sget_userns+0x6b1/0xe40 [ 347.090853] ? set_anon_super+0x20/0x20 [ 347.094835] ? put_filp+0x90/0x90 [ 347.098285] ? destroy_unused_super.part.6+0xd0/0xd0 [ 347.103375] ? alloc_vfsmnt+0x762/0x9c0 [ 347.107331] ? path_lookupat+0x238/0xba0 [ 347.111372] ? mnt_free_id.isra.21+0x50/0x50 [ 347.115759] ? trace_hardirqs_off+0x10/0x10 [ 347.120061] ? putname+0xee/0x130 [ 347.123494] ? cap_capable+0x1b5/0x230 [ 347.127360] ? security_capable+0x8e/0xc0 [ 347.131493] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 347.136666] ? ns_capable_common+0xcf/0x160 [ 347.140978] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 347.146147] mount_ns+0x6d/0x190 [ 347.149496] rpc_mount+0x9e/0xd0 [ 347.152837] mount_fs+0x66/0x2d0 [ 347.156182] vfs_kern_mount.part.26+0xc6/0x4a0 [ 347.160741] ? may_umount+0xa0/0xa0 [ 347.164343] ? _raw_read_unlock+0x22/0x30 [ 347.168465] ? __get_fs_type+0x8a/0xc0 [ 347.172331] do_mount+0xea4/0x2bb0 [ 347.175845] ? __might_fault+0x110/0x1d0 [ 347.179886] ? copy_mount_string+0x40/0x40 [ 347.184095] ? check_same_owner+0x320/0x320 [ 347.188397] ? __check_object_size+0x8b/0x530 [ 347.192874] ? __might_sleep+0x95/0x190 [ 347.196827] ? kasan_check_write+0x14/0x20 [ 347.201039] ? _copy_from_user+0x99/0x110 [ 347.205165] ? memdup_user+0x5e/0x90 [ 347.208852] ? copy_mount_options+0x1f7/0x2e0 [ 347.213323] SyS_mount+0xab/0x120 [ 347.216756] ? copy_mnt_ns+0xb30/0xb30 [ 347.220626] do_syscall_64+0x281/0x940 [ 347.224495] ? __do_page_fault+0xc90/0xc90 [ 347.228708] ? _raw_spin_unlock_irq+0x27/0x70 [ 347.233175] ? finish_task_switch+0x1c1/0x7e0 [ 347.237659] ? syscall_return_slowpath+0x550/0x550 [ 347.242571] ? syscall_return_slowpath+0x2ac/0x550 [ 347.247479] ? prepare_exit_to_usermode+0x350/0x350 [ 347.252478] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 347.257819] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.262655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.267816] RIP: 0033:0x4548b9 [ 347.270979] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 347.278659] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 347.285903] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 347.293144] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 347.300388] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 02:11:48 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838", 0x22}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) 2018/03/30 02:11:48 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:48 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2f) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000280)) mkdir(&(0x7f0000000440)='./file0/file0\x00', 0x1000002000000020) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f00000007c0)='ramfs\x00', 0x0, &(0x7f000056a0e2)) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={0x0, 0x80000001, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000380)='./file0/file0\x00', r1}, 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000480)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/220, 0xdc}, {&(0x7f0000000600)=""/164, 0xa4}], 0x2, 0x0, 0x0, 0x4}, 0x1) sendmsg$kcm(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000740)="67e25f8121", 0x5}], 0x1, &(0x7f0000000900)=ANY=[@ANYBLOB="00010000000000000901000004000000002209aec389ba4a1dd998fea7bee873ec026e598f6f87ec2a0835bcdbc796117fe3038d6d7e3ea6d4401d24f490a192f914b53520cb68cfc2f44b096e28fbc05a8545458c588d617243319bcc01cfe89478f38fb745358671815621860e791c4056bc0c16a74cef23ace89e5be464b1dd69a8e9bd1ecad2ca8586232095397f059563e669718e3c163287ff775682621e3d87f9e4469ecdbb90d2a7b93524beb7abdbc13ae9fed4e1eb1cb1781858c8c4d5d04622d9ec3c6b7e92a5f08f93f19ab553a39814dbf234cdc01275409314b74b7cd03486ade29a3af58ea5ed0c90d32271fab69b8aea7e498911e059ff2da300000000000000"], 0x100, 0x80}, 0x1f9f7c99dbbdff67) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000800)='./file0/file0\x00', &(0x7f0000000840)='qnx4\x00', 0x100090, &(0x7f0000000880)="166ab66c63e54778519062b8f39a7983f90a669f2e73392bc2617473aa199d7b4ed16809c2dd91792eed5f5f1649718c517140c1f7f2d69307d0654022fd3d98437ac760595e25ed0ddf4b52b6d14c23436a5ee969401eba1907b0c6975b280f3e6d040a26374c9479") mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='selinuxfs\x00', 0x100000, &(0x7f0000000180)="f3654242d6e655b3b868634fbd98915b2d793d75b314e906f150617eb43d57a6c027e0329ef31283b3e19bdf18fd7da4b3cfa01c1de9d93345089984afbf74a9704e36786c46a0ed053d4e5da39df7c360b1c77fb77feb171602d5f8219ed4e97e2750e77c86b0cf22fae795f022f0ebfc595ad28ab70f6b8b1642a319cc087ec30e4e1e373a45e088dad2253f34f2eaf003bb4920") 2018/03/30 02:11:48 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065c", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:48 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:48 executing program 1 (fault-call:15 fault-nth:43): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x80000000, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 347.307638] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002a 2018/03/30 02:11:48 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065c", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 347.639401] FAULT_INJECTION: forcing a failure. [ 347.639401] name failslab, interval 1, probability 0, space 0, times 0 [ 347.650810] CPU: 1 PID: 19808 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 347.658079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.667423] Call Trace: [ 347.670009] dump_stack+0x194/0x24d [ 347.673644] ? arch_local_irq_restore+0x53/0x53 [ 347.678309] ? __save_stack_trace+0x7e/0xd0 [ 347.682644] should_fail+0x8c0/0xa40 [ 347.686357] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 347.691457] ? kasan_kmalloc+0xad/0xe0 [ 347.695333] ? kmem_cache_alloc_trace+0x136/0x740 [ 347.700168] ? __memcg_init_list_lru_node+0x169/0x270 [ 347.705342] ? __list_lru_init+0x544/0x750 [ 347.709566] ? sget_userns+0x6b1/0xe40 [ 347.713451] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 347.718198] ? do_mount+0xea4/0x2bb0 [ 347.721898] ? SyS_mount+0xab/0x120 [ 347.725515] ? do_syscall_64+0x281/0x940 [ 347.729565] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.734935] ? find_held_lock+0x35/0x1d0 2018/03/30 02:11:48 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x0, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 347.738999] ? __lock_is_held+0xb6/0x140 [ 347.743075] ? check_same_owner+0x320/0x320 [ 347.747399] ? rcu_note_context_switch+0x710/0x710 [ 347.752334] should_failslab+0xec/0x120 [ 347.756310] kmem_cache_alloc_trace+0x4b/0x740 [ 347.760882] ? __kmalloc_node+0x33/0x70 [ 347.764841] ? __kmalloc_node+0x33/0x70 [ 347.768804] ? rcu_read_lock_sched_held+0x108/0x120 [ 347.773827] __memcg_init_list_lru_node+0x169/0x270 [ 347.778845] ? list_lru_add+0x7c0/0x7c0 [ 347.782815] ? __kmalloc_node+0x47/0x70 [ 347.786799] __list_lru_init+0x544/0x750 [ 347.790860] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 347.796747] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 347.801769] ? lockdep_init_map+0x9/0x10 [ 347.805832] sget_userns+0x6b1/0xe40 [ 347.809537] ? set_anon_super+0x20/0x20 [ 347.813517] ? put_filp+0x90/0x90 [ 347.816969] ? destroy_unused_super.part.6+0xd0/0xd0 [ 347.822063] ? alloc_vfsmnt+0x762/0x9c0 [ 347.826033] ? path_lookupat+0x238/0xba0 [ 347.830093] ? mnt_free_id.isra.21+0x50/0x50 [ 347.834502] ? trace_hardirqs_off+0x10/0x10 [ 347.838824] ? putname+0xee/0x130 [ 347.842276] ? cap_capable+0x1b5/0x230 [ 347.846169] ? security_capable+0x8e/0xc0 [ 347.850316] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 347.855492] ? ns_capable_common+0xcf/0x160 [ 347.859812] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 347.864992] mount_ns+0x6d/0x190 [ 347.868362] rpc_mount+0x9e/0xd0 [ 347.871730] mount_fs+0x66/0x2d0 [ 347.875096] vfs_kern_mount.part.26+0xc6/0x4a0 [ 347.879677] ? may_umount+0xa0/0xa0 [ 347.883296] ? _raw_read_unlock+0x22/0x30 [ 347.887436] ? __get_fs_type+0x8a/0xc0 [ 347.891324] do_mount+0xea4/0x2bb0 [ 347.894852] ? __might_fault+0x110/0x1d0 [ 347.898915] ? copy_mount_string+0x40/0x40 [ 347.903139] ? check_same_owner+0x320/0x320 [ 347.907448] ? __check_object_size+0x8b/0x530 [ 347.911942] ? __might_sleep+0x95/0x190 [ 347.915918] ? kasan_check_write+0x14/0x20 [ 347.920486] ? _copy_from_user+0x99/0x110 [ 347.924634] ? memdup_user+0x5e/0x90 [ 347.928337] ? copy_mount_options+0x1f7/0x2e0 [ 347.932830] SyS_mount+0xab/0x120 [ 347.936274] ? copy_mnt_ns+0xb30/0xb30 [ 347.940160] do_syscall_64+0x281/0x940 [ 347.944039] ? __do_page_fault+0xc90/0xc90 [ 347.948260] ? _raw_spin_unlock_irq+0x27/0x70 [ 347.952747] ? finish_task_switch+0x1c1/0x7e0 [ 347.957231] ? syscall_return_slowpath+0x550/0x550 [ 347.962152] ? syscall_return_slowpath+0x2ac/0x550 [ 347.967074] ? prepare_exit_to_usermode+0x350/0x350 [ 347.972096] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 347.977460] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.982310] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.987488] RIP: 0033:0x4548b9 [ 347.990663] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 347.998356] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 348.005611] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 348.012869] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 348.020127] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 348.027382] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002b [ 348.456224] IPVS: ftp: loaded support on port[0] = 21 [ 348.500033] cgroup: cgroup2: unknown option "./file0/" [ 349.208181] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 02:11:50 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x0, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 1 (fault-call:15 fault-nth:44): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 6: bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="980000000000000000000000028000006a0a00fffffff60061189c"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x8, 0x6, 0x6, 0x7, 0x2, 0xffffffffffffffff, 0x7fffffff}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f00000003c0)="387fa57e25f202dfd469ae122c8a4df92be727efcd87d48f527d1959024ddc0cd9f9f7538ffa151f8ba392378e8d6fd97d32efb7726f866408efc4c9eed96faffb9df823880f40de13a7683c80f54575b582b3ee7bd3280a48ac7fa92355a035c48afa562b7c1945015e72f3abc84fcd5e98a004c043a6135676c91a558a51ffa601c65ff15d143d2a2b6ae7e25d93a133a49f4cd40815caf6e05c5ad8ac41b2d709dff40d71e1d412dae8578a4861da1f4ab0fb25b89d2a1d91ad28f7", &(0x7f0000000480)=""/79}, 0x18) 2018/03/30 02:11:50 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8", 0x23}], 0x1, &(0x7f00000009c0)=ANY=[@ANYBLOB="88000000000000009f010000050000003d55aae14acb7d2a02bd956ff8ef9eb1f852a07c9820e52525209b0afaddcdc3e0d9ba737a54641ceb508e2f560f53aff0842937a48e832575fdcbd1d1843e8c767bdbb24d26b37d218745f909effd74586b6e89c9a5f91778e2f94e219357dace676c67630000000000"], 0x7a, 0x4004090}, 0x810) 2018/03/30 02:11:50 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 349.419951] FAULT_INJECTION: forcing a failure. [ 349.419951] name failslab, interval 1, probability 0, space 0, times 0 [ 349.431255] CPU: 1 PID: 19845 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 349.438516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.447856] Call Trace: [ 349.450434] dump_stack+0x194/0x24d [ 349.454057] ? arch_local_irq_restore+0x53/0x53 [ 349.458715] ? __save_stack_trace+0x7e/0xd0 [ 349.463048] should_fail+0x8c0/0xa40 [ 349.466760] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 349.471853] ? kasan_kmalloc+0xad/0xe0 [ 349.475725] ? kmem_cache_alloc_trace+0x136/0x740 [ 349.480552] ? __memcg_init_list_lru_node+0x169/0x270 [ 349.485729] ? __list_lru_init+0x544/0x750 [ 349.489953] ? sget_userns+0x6b1/0xe40 [ 349.493832] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 349.498576] ? do_mount+0xea4/0x2bb0 [ 349.502274] ? SyS_mount+0xab/0x120 [ 349.505889] ? do_syscall_64+0x281/0x940 [ 349.509939] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.515330] ? find_held_lock+0x35/0x1d0 [ 349.519393] ? __lock_is_held+0xb6/0x140 [ 349.523467] ? check_same_owner+0x320/0x320 [ 349.527781] ? rcu_note_context_switch+0x710/0x710 [ 349.532711] should_failslab+0xec/0x120 [ 349.536675] kmem_cache_alloc_trace+0x4b/0x740 [ 349.541246] ? __kmalloc_node+0x33/0x70 [ 349.545207] ? __kmalloc_node+0x33/0x70 [ 349.549170] ? rcu_read_lock_sched_held+0x108/0x120 [ 349.554184] __memcg_init_list_lru_node+0x169/0x270 [ 349.559194] ? list_lru_add+0x7c0/0x7c0 [ 349.563159] ? __kmalloc_node+0x47/0x70 [ 349.567133] __list_lru_init+0x544/0x750 [ 349.571191] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 349.577070] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 349.582086] ? lockdep_init_map+0x9/0x10 [ 349.586138] sget_userns+0x6b1/0xe40 [ 349.589840] ? set_anon_super+0x20/0x20 [ 349.593811] ? put_filp+0x90/0x90 [ 349.597256] ? destroy_unused_super.part.6+0xd0/0xd0 [ 349.602343] ? alloc_vfsmnt+0x762/0x9c0 [ 349.606305] ? path_lookupat+0x238/0xba0 [ 349.610355] ? mnt_free_id.isra.21+0x50/0x50 [ 349.614758] ? trace_hardirqs_off+0x10/0x10 [ 349.619071] ? putname+0xee/0x130 [ 349.622520] ? cap_capable+0x1b5/0x230 [ 349.626408] ? security_capable+0x8e/0xc0 [ 349.630552] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 349.635727] ? ns_capable_common+0xcf/0x160 [ 349.640043] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 349.645216] mount_ns+0x6d/0x190 [ 349.648576] rpc_mount+0x9e/0xd0 [ 349.651933] mount_fs+0x66/0x2d0 [ 349.655302] vfs_kern_mount.part.26+0xc6/0x4a0 [ 349.659875] ? may_umount+0xa0/0xa0 [ 349.663493] ? _raw_read_unlock+0x22/0x30 [ 349.667626] ? __get_fs_type+0x8a/0xc0 [ 349.671513] do_mount+0xea4/0x2bb0 [ 349.675039] ? __might_fault+0x110/0x1d0 [ 349.679100] ? copy_mount_string+0x40/0x40 [ 349.683322] ? check_same_owner+0x320/0x320 [ 349.687632] ? __check_object_size+0x8b/0x530 [ 349.692129] ? __might_sleep+0x95/0x190 [ 349.696103] ? kasan_check_write+0x14/0x20 [ 349.700326] ? _copy_from_user+0x99/0x110 [ 349.704466] ? memdup_user+0x5e/0x90 [ 349.708166] ? copy_mount_options+0x1f7/0x2e0 [ 349.712658] SyS_mount+0xab/0x120 [ 349.716101] ? copy_mnt_ns+0xb30/0xb30 [ 349.719978] do_syscall_64+0x281/0x940 [ 349.723849] ? __do_page_fault+0xc90/0xc90 [ 349.728070] ? _raw_spin_unlock_irq+0x27/0x70 [ 349.732555] ? finish_task_switch+0x1c1/0x7e0 [ 349.737043] ? syscall_return_slowpath+0x550/0x550 [ 349.741962] ? syscall_return_slowpath+0x2ac/0x550 [ 349.746884] ? prepare_exit_to_usermode+0x350/0x350 [ 349.751889] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 349.757252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.762093] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.767266] RIP: 0033:0x4548b9 2018/03/30 02:11:50 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 349.770438] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 349.778133] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 349.785385] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 349.792642] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 349.799895] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 349.807151] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002c 2018/03/30 02:11:50 executing program 1 (fault-call:15 fault-nth:45): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r5, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r6, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1, &(0x7f0000000d40)="faa8ccd12d3afbfd405d1095f267ea5cc88049ef35910ea4a7000f1f4045a3d9ed99740f77882a9f0fb08f9b9cd087d28233143c3e254e0e01127e134c800b72af286f589ae4be9f3d2a4567afa5fb8651718a71a0943eebb27b4bb21606dc2b95db2a53f8d007bb94d06ca62184d26de620a5e616d7c159319e5bd8b34d9583a748f6630445c49ba1e61e00fc9a26e6b1121220f8a0c9cba7e8d1bc440ad79e0ccb01c3c838d6d218b85c285397ff5e939021b7f76d7f35df9ecdc9648f0e91"}, 0x10) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:50 executing program 6: mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='nilfs2\x00', 0x40, &(0x7f00000002c0)="dbbe1fee839a4f") mkdir(&(0x7f0000000180)='./file1\x00', 0x44) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000540)={&(0x7f00000003c0)='./file1/file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r0, 0x28, &(0x7f0000000580)}, 0x10) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r1}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r1, &(0x7f0000000200), &(0x7f0000000300)=""/18}, 0x18) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f0000000380)='./file1/file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000440)={&(0x7f0000000400)='./file0/file0\x00', r2}, 0x10) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, &(0x7f0000000300)) 2018/03/30 02:11:50 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0xa, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:50 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 350.097846] FAULT_INJECTION: forcing a failure. [ 350.097846] name failslab, interval 1, probability 0, space 0, times 0 [ 350.109198] CPU: 0 PID: 19867 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 350.116465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.125810] Call Trace: [ 350.128395] dump_stack+0x194/0x24d [ 350.132031] ? arch_local_irq_restore+0x53/0x53 [ 350.136693] ? __save_stack_trace+0x7e/0xd0 [ 350.141023] should_fail+0x8c0/0xa40 [ 350.144740] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 350.149842] ? kasan_kmalloc+0xad/0xe0 [ 350.153727] ? kmem_cache_alloc_trace+0x136/0x740 [ 350.158564] ? __memcg_init_list_lru_node+0x169/0x270 [ 350.163742] ? __list_lru_init+0x544/0x750 [ 350.167964] ? sget_userns+0x6b1/0xe40 [ 350.171845] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 350.176594] ? do_mount+0xea4/0x2bb0 [ 350.180298] ? SyS_mount+0xab/0x120 [ 350.183914] ? do_syscall_64+0x281/0x940 [ 350.187964] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.193324] ? find_held_lock+0x35/0x1d0 [ 350.197378] ? __lock_is_held+0xb6/0x140 [ 350.201452] ? check_same_owner+0x320/0x320 [ 350.205762] ? rcu_note_context_switch+0x710/0x710 [ 350.210690] should_failslab+0xec/0x120 [ 350.214644] kmem_cache_alloc_trace+0x4b/0x740 [ 350.219205] ? __kmalloc_node+0x33/0x70 [ 350.223184] __memcg_init_list_lru_node+0x169/0x270 [ 350.228189] ? list_lru_add+0x7c0/0x7c0 [ 350.232145] ? __kmalloc_node+0x47/0x70 [ 350.236115] __list_lru_init+0x544/0x750 [ 350.240169] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 350.246042] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 350.251058] ? lockdep_init_map+0x9/0x10 [ 350.255105] sget_userns+0x6b1/0xe40 [ 350.258797] ? set_anon_super+0x20/0x20 [ 350.262762] ? put_filp+0x90/0x90 [ 350.266198] ? destroy_unused_super.part.6+0xd0/0xd0 [ 350.271280] ? alloc_vfsmnt+0x762/0x9c0 [ 350.275230] ? path_lookupat+0x238/0xba0 [ 350.279274] ? mnt_free_id.isra.21+0x50/0x50 [ 350.283670] ? trace_hardirqs_off+0x10/0x10 [ 350.287976] ? putname+0xee/0x130 [ 350.291419] ? cap_capable+0x1b5/0x230 [ 350.295297] ? security_capable+0x8e/0xc0 [ 350.299431] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 350.304600] ? ns_capable_common+0xcf/0x160 [ 350.308911] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 350.314077] mount_ns+0x6d/0x190 [ 350.317432] rpc_mount+0x9e/0xd0 [ 350.320785] mount_fs+0x66/0x2d0 [ 350.324142] vfs_kern_mount.part.26+0xc6/0x4a0 [ 350.328711] ? may_umount+0xa0/0xa0 [ 350.332316] ? _raw_read_unlock+0x22/0x30 [ 350.336444] ? __get_fs_type+0x8a/0xc0 [ 350.340325] do_mount+0xea4/0x2bb0 [ 350.343839] ? __might_fault+0x110/0x1d0 [ 350.347897] ? copy_mount_string+0x40/0x40 [ 350.352111] ? check_same_owner+0x320/0x320 [ 350.356415] ? __check_object_size+0x8b/0x530 [ 350.360908] ? __might_sleep+0x95/0x190 [ 350.364874] ? kasan_check_write+0x14/0x20 [ 350.369088] ? _copy_from_user+0x99/0x110 [ 350.373226] ? memdup_user+0x5e/0x90 [ 350.376918] ? copy_mount_options+0x1f7/0x2e0 [ 350.381407] SyS_mount+0xab/0x120 [ 350.384839] ? copy_mnt_ns+0xb30/0xb30 [ 350.388713] do_syscall_64+0x281/0x940 [ 350.392578] ? __do_page_fault+0xc90/0xc90 [ 350.396787] ? _raw_spin_unlock_irq+0x27/0x70 [ 350.401262] ? finish_task_switch+0x1c1/0x7e0 [ 350.405741] ? syscall_return_slowpath+0x550/0x550 [ 350.410652] ? syscall_return_slowpath+0x2ac/0x550 [ 350.415563] ? prepare_exit_to_usermode+0x350/0x350 [ 350.420560] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 350.425916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.430751] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.435918] RIP: 0033:0x4548b9 [ 350.439087] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 02:11:51 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:51 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 350.446773] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 350.454023] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 350.461273] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 350.468521] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 350.475767] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002d 2018/03/30 02:11:51 executing program 1 (fault-call:15 fault-nth:46): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:51 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = getpid() r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x7, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x801, 0x5da, 0x8, 0x80, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, r3, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x800000000000001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r5, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r6, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 350.842945] FAULT_INJECTION: forcing a failure. [ 350.842945] name failslab, interval 1, probability 0, space 0, times 0 [ 350.854233] CPU: 0 PID: 19893 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 350.861481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.870810] Call Trace: [ 350.873378] dump_stack+0x194/0x24d [ 350.876985] ? arch_local_irq_restore+0x53/0x53 [ 350.881642] ? __save_stack_trace+0x7e/0xd0 [ 350.885961] should_fail+0x8c0/0xa40 [ 350.889666] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 350.894752] ? kasan_kmalloc+0xad/0xe0 [ 350.898623] ? kmem_cache_alloc_trace+0x136/0x740 [ 350.903439] ? __memcg_init_list_lru_node+0x169/0x270 [ 350.908613] ? __list_lru_init+0x544/0x750 [ 350.912820] ? sget_userns+0x6b1/0xe40 [ 350.916683] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 350.921412] ? do_mount+0xea4/0x2bb0 [ 350.925100] ? SyS_mount+0xab/0x120 [ 350.928701] ? do_syscall_64+0x281/0x940 [ 350.932737] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.938095] ? find_held_lock+0x35/0x1d0 [ 350.942139] ? __lock_is_held+0xb6/0x140 [ 350.946186] ? check_same_owner+0x320/0x320 [ 350.950486] ? rcu_note_context_switch+0x710/0x710 [ 350.955397] should_failslab+0xec/0x120 [ 350.959348] kmem_cache_alloc_trace+0x4b/0x740 [ 350.963906] ? __kmalloc_node+0x33/0x70 [ 350.967864] __memcg_init_list_lru_node+0x169/0x270 [ 350.972866] ? list_lru_add+0x7c0/0x7c0 [ 350.976813] ? __kmalloc_node+0x47/0x70 [ 350.980768] __list_lru_init+0x544/0x750 [ 350.984807] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 350.990665] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 350.995660] ? lockdep_init_map+0x9/0x10 [ 350.999710] sget_userns+0x6b1/0xe40 [ 351.003405] ? set_anon_super+0x20/0x20 [ 351.007371] ? put_filp+0x90/0x90 [ 351.010803] ? destroy_unused_super.part.6+0xd0/0xd0 [ 351.015876] ? alloc_vfsmnt+0x762/0x9c0 [ 351.019823] ? path_lookupat+0x238/0xba0 [ 351.023863] ? mnt_free_id.isra.21+0x50/0x50 [ 351.028249] ? trace_hardirqs_off+0x10/0x10 [ 351.032548] ? putname+0xee/0x130 [ 351.035977] ? cap_capable+0x1b5/0x230 [ 351.039841] ? security_capable+0x8e/0xc0 [ 351.043964] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 351.049126] ? ns_capable_common+0xcf/0x160 [ 351.053429] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 351.058590] mount_ns+0x6d/0x190 [ 351.061934] rpc_mount+0x9e/0xd0 [ 351.065275] mount_fs+0x66/0x2d0 [ 351.068620] vfs_kern_mount.part.26+0xc6/0x4a0 [ 351.073187] ? may_umount+0xa0/0xa0 [ 351.076794] ? _raw_read_unlock+0x22/0x30 [ 351.080919] ? __get_fs_type+0x8a/0xc0 [ 351.084785] do_mount+0xea4/0x2bb0 [ 351.088576] ? __might_fault+0x110/0x1d0 [ 351.092625] ? copy_mount_string+0x40/0x40 [ 351.096833] ? check_same_owner+0x320/0x320 [ 351.101130] ? __check_object_size+0x8b/0x530 [ 351.105602] ? __might_sleep+0x95/0x190 [ 351.109559] ? kasan_check_write+0x14/0x20 [ 351.113766] ? _copy_from_user+0x99/0x110 [ 351.117904] ? memdup_user+0x5e/0x90 [ 351.121598] ? copy_mount_options+0x1f7/0x2e0 [ 351.126079] SyS_mount+0xab/0x120 [ 351.129510] ? copy_mnt_ns+0xb30/0xb30 [ 351.133375] do_syscall_64+0x281/0x940 [ 351.137238] ? __do_page_fault+0xc90/0xc90 [ 351.141443] ? _raw_spin_unlock_irq+0x27/0x70 [ 351.145923] ? finish_task_switch+0x1c1/0x7e0 [ 351.150415] ? syscall_return_slowpath+0x550/0x550 [ 351.155332] ? syscall_return_slowpath+0x2ac/0x550 [ 351.160242] ? prepare_exit_to_usermode+0x350/0x350 [ 351.165234] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 351.170577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.175408] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.180571] RIP: 0033:0x4548b9 [ 351.183735] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 351.191416] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 351.198659] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 351.205906] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 351.213151] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 351.220396] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002e [ 351.312829] IPVS: ftp: loaded support on port[0] = 21 [ 351.465117] cgroup: cgroup2: unknown option "./file0/" 2018/03/30 02:11:52 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000680)='./file0/file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0xfffffffffffffffd, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@ax25={0x3, {"02f47b3723e03d"}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000001840)=ANY=[], 0x0, 0x24004044}, 0x4008001) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f00000006c0)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x200000000000002, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) mount(&(0x7f0000000c00)='./file0/file0\x00', &(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000c40)='fuse\x00', 0x2000064, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") recvmsg(r1, &(0x7f0000008500)={&(0x7f0000008280)=@hci, 0x80, &(0x7f00000083c0)=[{&(0x7f0000008300)=""/138, 0x8a}], 0x1, &(0x7f0000008400)=""/207, 0xcf, 0x6}, 0x2003) r5 = gettid() socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000640)) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0x117e, 0x406, 0x0, 0x5, 0x0, 0xfffffffffffffffa, 0x2001, 0xb, 0x48, 0x3, 0x6, 0x0, 0x9, 0xd8e, 0x3, 0x1, 0x72, 0x0, 0x8, 0x3, 0x5, 0x1, 0x0, 0xf000000000000000, 0x0, 0x0, 0x10001, 0x400, 0x2, 0x3, 0x1, 0xb04, 0x30, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0xd}, 0x210, 0x8, 0x7, 0x4, 0x80000000, 0x2, 0x2}, r5, 0xe, 0xffffffffffffffff, 0x1) 2018/03/30 02:11:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x2, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f0000000e00)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000a80)={&(0x7f0000000080)='./file1\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f0000000ec0)='./file0/file0\x00', r0}, 0x10) socketpair(0x5, 0x1, 0x81, &(0x7f0000000d40)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x80000001, 0xea, 0xa, r4, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r5, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={r6, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000d80)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 1 (fault-call:15 fault-nth:47): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x0, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x810) 2018/03/30 02:11:52 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:52 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 351.659097] FAULT_INJECTION: forcing a failure. [ 351.659097] name failslab, interval 1, probability 0, space 0, times 0 [ 351.670439] CPU: 0 PID: 19919 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 351.677707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.687054] Call Trace: [ 351.689640] dump_stack+0x194/0x24d [ 351.693277] ? arch_local_irq_restore+0x53/0x53 [ 351.697936] ? __save_stack_trace+0x7e/0xd0 [ 351.702245] should_fail+0x8c0/0xa40 [ 351.705940] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 351.711026] ? kasan_kmalloc+0xad/0xe0 [ 351.714900] ? kmem_cache_alloc_trace+0x136/0x740 [ 351.719727] ? __memcg_init_list_lru_node+0x169/0x270 [ 351.724894] ? __list_lru_init+0x544/0x750 [ 351.729106] ? sget_userns+0x6b1/0xe40 [ 351.732973] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 351.737706] ? do_mount+0xea4/0x2bb0 [ 351.741399] ? SyS_mount+0xab/0x120 [ 351.745006] ? do_syscall_64+0x281/0x940 [ 351.749047] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.754394] ? find_held_lock+0x35/0x1d0 [ 351.758439] ? __lock_is_held+0xb6/0x140 [ 351.762487] ? check_same_owner+0x320/0x320 [ 351.766787] ? rcu_note_context_switch+0x710/0x710 [ 351.771711] should_failslab+0xec/0x120 [ 351.775672] kmem_cache_alloc_trace+0x4b/0x740 [ 351.780226] ? __kmalloc_node+0x33/0x70 [ 351.784171] ? __kmalloc_node+0x33/0x70 [ 351.788123] ? rcu_read_lock_sched_held+0x108/0x120 [ 351.793118] __memcg_init_list_lru_node+0x169/0x270 [ 351.798114] ? list_lru_add+0x7c0/0x7c0 [ 351.802065] ? __kmalloc_node+0x47/0x70 [ 351.806032] __list_lru_init+0x544/0x750 [ 351.810078] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 351.815937] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 351.820933] ? lockdep_init_map+0x9/0x10 [ 351.824969] sget_userns+0x6b1/0xe40 [ 351.828654] ? set_anon_super+0x20/0x20 [ 351.832605] ? put_filp+0x90/0x90 [ 351.836045] ? destroy_unused_super.part.6+0xd0/0xd0 [ 351.841131] ? alloc_vfsmnt+0x762/0x9c0 [ 351.845087] ? path_lookupat+0x238/0xba0 [ 351.849126] ? mnt_free_id.isra.21+0x50/0x50 [ 351.853531] ? trace_hardirqs_off+0x10/0x10 [ 351.857834] ? putname+0xee/0x130 [ 351.861273] ? cap_capable+0x1b5/0x230 [ 351.865150] ? security_capable+0x8e/0xc0 [ 351.869282] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 351.874446] ? ns_capable_common+0xcf/0x160 [ 351.878743] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 351.883904] mount_ns+0x6d/0x190 [ 351.887255] rpc_mount+0x9e/0xd0 [ 351.890606] mount_fs+0x66/0x2d0 [ 351.893962] vfs_kern_mount.part.26+0xc6/0x4a0 [ 351.898527] ? may_umount+0xa0/0xa0 [ 351.902128] ? _raw_read_unlock+0x22/0x30 [ 351.906251] ? __get_fs_type+0x8a/0xc0 [ 351.910117] do_mount+0xea4/0x2bb0 [ 351.913630] ? __might_fault+0x110/0x1d0 [ 351.917670] ? copy_mount_string+0x40/0x40 [ 351.921883] ? check_same_owner+0x320/0x320 [ 351.926185] ? __check_object_size+0x8b/0x530 [ 351.930664] ? __might_sleep+0x95/0x190 [ 351.934618] ? kasan_check_write+0x14/0x20 [ 351.938828] ? _copy_from_user+0x99/0x110 [ 351.942951] ? memdup_user+0x5e/0x90 [ 351.946636] ? copy_mount_options+0x1f7/0x2e0 [ 351.951111] SyS_mount+0xab/0x120 [ 351.954546] ? copy_mnt_ns+0xb30/0xb30 [ 351.958412] do_syscall_64+0x281/0x940 [ 351.962272] ? __do_page_fault+0xc90/0xc90 [ 351.966478] ? _raw_spin_unlock_irq+0x27/0x70 [ 351.970945] ? finish_task_switch+0x1c1/0x7e0 [ 351.975416] ? syscall_return_slowpath+0x550/0x550 [ 351.980319] ? syscall_return_slowpath+0x2ac/0x550 [ 351.985223] ? prepare_exit_to_usermode+0x350/0x350 [ 351.990215] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 351.995558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.000383] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.005544] RIP: 0033:0x4548b9 2018/03/30 02:11:52 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x0, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:52 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x10, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000008}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000d80)) 2018/03/30 02:11:52 executing program 1 (fault-call:15 fault-nth:48): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 352.008705] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 352.016386] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 352.023627] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 352.030868] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 352.038109] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 352.045352] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002f 2018/03/30 02:11:52 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x5, 0x100000000209e20, 0x8000000001}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0x0, 0x1, 0x8}, 0xc) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x13, 0x0, 0x7ffff9, 0x0, 0x20000003, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000400)={r0, &(0x7f0000000200)="550a453681c2e6e1507ce02cf6bc283845013abaf7f91f5feb3d9f4d5b21207c9873a3b33a3c5be5426e844870f2d9632758e8fe260ecb2e1d8643f5b96982cc60d70cba7b2f6b3fa593f90a890eb4d8eef51ecca52f8b048414ba4fb83f382359a632113769787b53147cbe67126b2bb007a5f6d6f8d7c97864791f3d4fe4a227ff22a3a7c7c57f05e106307bc3a76b"}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000080)=""/70}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0x0, 0x7, 0x18}, 0xc) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x0, 0x81, 0x7e, 0x1, 0x0, 0x20, 0xc1020, 0x0, 0x0, 0x100, 0x5, 0x8, 0x200, 0xffffffff, 0x3, 0x3ffc00000000, 0x1, 0x101, 0xd3, 0x3f, 0x8, 0x1, 0x0, 0x0, 0xffffffff, 0x4166, 0xffffffffffffffff, 0x3c7e, 0x806e, 0x10001, 0x5, 0x8000, 0x4, 0x4, 0x400, 0x3, 0x0, 0x101, 0x0, @perf_config_ext={0x8, 0x2}, 0x4004, 0x8, 0x401, 0x0, 0x0, 0x4, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x1) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x0, 0x1}, 0x2c) mount(&(0x7f0000000600)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000800)="6270660010a77765c3e8ad12a8755be4285b239ebf6299f13cb0ed5dab4d77b8e69188e55dcf564f96b4a68c28829b86ca037ca6599b634443232ed2205eef27f9cdc77d73472801c4", 0x0, &(0x7f0000000200)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000480)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000007c0)) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/234, 0xea}, {&(0x7f0000000180)=""/9, 0x9}, {&(0x7f0000000500)=""/192, 0xc0}, {&(0x7f00000005c0)=""/3, 0x3}, {&(0x7f0000000640)=""/174, 0xae}], 0x5, 0x0, 0x0, 0xffffffff}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002d80)={&(0x7f0000002d40)='./file0/file0/file0\x00'}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x50, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r5, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000008c0)={r1, 0x28, &(0x7f0000000880)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r3, 0x50, &(0x7f0000000900)}, 0x10) 2018/03/30 02:11:52 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x810) [ 352.396861] FAULT_INJECTION: forcing a failure. [ 352.396861] name failslab, interval 1, probability 0, space 0, times 0 [ 352.408158] CPU: 1 PID: 19942 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 352.415421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.424761] Call Trace: [ 352.427344] dump_stack+0x194/0x24d [ 352.430965] ? arch_local_irq_restore+0x53/0x53 [ 352.435617] ? __save_stack_trace+0x7e/0xd0 [ 352.439943] should_fail+0x8c0/0xa40 [ 352.443651] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 352.448740] ? kasan_kmalloc+0xad/0xe0 [ 352.452610] ? kmem_cache_alloc_trace+0x136/0x740 [ 352.457438] ? __memcg_init_list_lru_node+0x169/0x270 [ 352.462611] ? __list_lru_init+0x544/0x750 [ 352.466828] ? sget_userns+0x6b1/0xe40 [ 352.470709] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 352.475455] ? do_mount+0xea4/0x2bb0 [ 352.479161] ? SyS_mount+0xab/0x120 [ 352.482784] ? do_syscall_64+0x281/0x940 [ 352.486838] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.492208] ? find_held_lock+0x35/0x1d0 [ 352.496277] ? __lock_is_held+0xb6/0x140 [ 352.500350] ? check_same_owner+0x320/0x320 [ 352.504675] ? rcu_note_context_switch+0x710/0x710 [ 352.509616] should_failslab+0xec/0x120 [ 352.513588] kmem_cache_alloc_trace+0x4b/0x740 [ 352.518159] ? __kmalloc_node+0x33/0x70 [ 352.522145] __memcg_init_list_lru_node+0x169/0x270 [ 352.527163] ? list_lru_add+0x7c0/0x7c0 [ 352.531131] ? __kmalloc_node+0x47/0x70 [ 352.535111] __list_lru_init+0x544/0x750 [ 352.539170] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 352.545052] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 352.550074] ? lockdep_init_map+0x9/0x10 [ 352.554133] sget_userns+0x6b1/0xe40 [ 352.557834] ? set_anon_super+0x20/0x20 [ 352.561808] ? put_filp+0x90/0x90 [ 352.565256] ? destroy_unused_super.part.6+0xd0/0xd0 [ 352.570350] ? alloc_vfsmnt+0x762/0x9c0 [ 352.574315] ? path_lookupat+0x238/0xba0 [ 352.578374] ? mnt_free_id.isra.21+0x50/0x50 [ 352.582782] ? trace_hardirqs_off+0x10/0x10 [ 352.587101] ? putname+0xee/0x130 [ 352.590552] ? cap_capable+0x1b5/0x230 [ 352.594441] ? security_capable+0x8e/0xc0 [ 352.598583] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 352.603763] ? ns_capable_common+0xcf/0x160 [ 352.608077] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 352.613256] mount_ns+0x6d/0x190 [ 352.616616] rpc_mount+0x9e/0xd0 [ 352.619977] mount_fs+0x66/0x2d0 [ 352.623338] vfs_kern_mount.part.26+0xc6/0x4a0 [ 352.627913] ? may_umount+0xa0/0xa0 [ 352.631527] ? _raw_read_unlock+0x22/0x30 [ 352.635661] ? __get_fs_type+0x8a/0xc0 [ 352.639545] do_mount+0xea4/0x2bb0 [ 352.643074] ? __might_fault+0x110/0x1d0 [ 352.647135] ? copy_mount_string+0x40/0x40 [ 352.651356] ? check_same_owner+0x320/0x320 [ 352.655668] ? __check_object_size+0x8b/0x530 [ 352.660169] ? __might_sleep+0x95/0x190 [ 352.664142] ? kasan_check_write+0x14/0x20 [ 352.668367] ? _copy_from_user+0x99/0x110 [ 352.672508] ? memdup_user+0x5e/0x90 [ 352.676208] ? copy_mount_options+0x1f7/0x2e0 [ 352.680703] SyS_mount+0xab/0x120 [ 352.684142] ? copy_mnt_ns+0xb30/0xb30 [ 352.688019] do_syscall_64+0x281/0x940 [ 352.691896] ? __do_page_fault+0xc90/0xc90 [ 352.696113] ? _raw_spin_unlock_irq+0x27/0x70 [ 352.700598] ? finish_task_switch+0x1c1/0x7e0 [ 352.705081] ? syscall_return_slowpath+0x550/0x550 [ 352.709997] ? syscall_return_slowpath+0x2ac/0x550 [ 352.714914] ? prepare_exit_to_usermode+0x350/0x350 [ 352.719921] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 352.725280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.730119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.735293] RIP: 0033:0x4548b9 [ 352.738471] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 352.746171] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 352.753426] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 352.760686] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 352.767940] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 352.775194] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000030 [ 353.037483] IPVS: ftp: loaded support on port[0] = 21 [ 353.095161] cgroup: cgroup2: unknown option "./file0/" 2018/03/30 02:11:53 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:53 executing program 1 (fault-call:15 fault-nth:49): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:53 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:53 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x0, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:53 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7, 0x3, 0x1, 0x11, r0}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f0000000d40)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000025c0)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") r6 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") sendmsg(r6, &(0x7f0000002580)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0x0, @any=0xffffffff}, 0x80, &(0x7f0000000ec0)=[{&(0x7f0000000dc0)="20c4f5f734365eebfb315e3ccee0406e796d1077b40663e116db84e91a71e26f78b00a63efceaa805628753b0a530b957009171aa1207aa2b0fd5b1b6156ff6befa77b6e9c74cb2c2f5978c938342871ec61d611f671aeaf35a2eebe871b563ec4504ac1651c457e26cf544b41df5390b42f3be66d38ab11c0f74ba3300084742db05b9025f83630ec5b03eb9c31c737271f366e9f3702b2f6d35c79386c52aea900f9637b376a9c480042c2b7ff2c66cab9a872d2b58419e2dcb0b03d29108ce69bb7adca2da0add48b11177a5db615f6887fb1fcceeff615b3253af2590910f60beecff8f72951628805", 0xeb}, {&(0x7f0000000280)="bdbba417a16e2960a5f0fc4f246e143e712484403dd7a5b8ad3c5042e882bb5f46576aa719851c734f1738ab67c1c9d2460ab1ac01764b9d42e0", 0x3a}, {&(0x7f00000008c0)="9c51650b82b9260eabf69a8917c9c94c6a4d52622d02fa0b62f8cf1f08d64f9e4f64b9814c79293a002a9fbb68775cc1a0807038ea698baac409107414bf525d4ca3a744cd407049c9ab87492e7bff", 0x4f}, {&(0x7f00000009c0)="f909890eebcd993d874b8bfd048846f6dbc26fa5ef1185f5a83fa4b5c186674c47fc7a27935ae76129595a", 0x2b}, {&(0x7f0000000a00)="07f6ea3bbea2e8d252501c237795bd8673617935639a0660399cf10f696ee03cf3278d15fa61e77433adf902e7b313e2aae2333d295638", 0x37}, {&(0x7f0000001140)="2832ab3c2bc1797a77ae8a83769d906b8466af521db45eb3db0ede5d8bc40c608ba7ab9713335a6e51df47e7ad8d9e1907918a22686b1d138a78b428dfc9eb1af65f9998b67bdb98a7aabf03b0b4714b28c7b31662ed23b20bc4dd5b18999022ef814b224c5525dac0d9d7a4cde529643615d88ed01bd3926a5f896cfe053899ee30f75ed61953738e1fdd4f507858e3f8ba3cbd17d7f5d62ee236bd18273cb820542d9a56f4afd127e967045c95a45bd6b158286b05a0b485a1123d186e10dfb8006345b470e2f1e0df168030a2997fbbbd721fcb09bc6caae5a9c2daf92797a29add8894da3cac42b6c57742ed971568d8d87ca21af1fdea733045fae55ca1e3098927e0ea43ce06e51fd95a1e6fd35a5fa14a732d74704ed327c2f0c94c3a6c7dca2a8a8750a6b31ed0955db72ad61a33197d4c974c3c4b02908410bd1a84b4be3e54500918f19e9b8f2f8696dfe1a275109566a571f14ccce5b25db9c467571697ab0d8b3f853a116c1719d33ea7c45eaaabc73c5275fe2fed1515f16a69a10eba913b0d6c167aed1ae8b3566fdfb3744d6baeee52ffdb4fe9b0965a2904e46f06d900f72745728048413fd14d4b6316efb7b11fbefc3b753bc9315f8fafbdce81773142553e03e95b938992984adfe2a01fad2bcca392614f4e6a9a2d4344c5cee7338a5b1ab94d8ced901a6971604e2227b70fdab0d73cbf4e852dba3053f023637aa6a238f3c636a0eae9f6e1968b482edda271aa1b4ee29a01ed78573483b9fb57ab356a5b8992caabc31b9c568ff55fe810fbb220e8816a9cbdf0c7c8299d885e898a74ca60fdf16c84f1c87db7a6f26732b4fb25dcc5e66732d007144db13b56e020e99fd6505b50ee2549ce0669b45f6b3e1b93186ef7dc2533c94f6ff5bddf21aba35446169ba3b40b71fa2c3123fc5920f68e2f16fab19e71663e4c0c03e68987f9aa9b539a6407a652cc978568c723aa32094fdb60dbcff43cccaf383b0cd7f97fd5121a08af5ac4c5c4965c519205d4bf9e8d565a98c12b867bd7417739009f5bc36fb09fc7c27d26fd8083e6be29608afdef0ba414cdd389c58ee8781b66e001993f401ce32a8990e2ab188f681a5b27da05034f0efbc8afe2fad0fc9ebf93518a32ce133c9a6d3415a7a384041318df50044b6dc3d25bbe363418893a24bc3d68e65fc45833d3599fa1a63fa24f8675e8fba5f7d6c825d4d106de86dcab01bae144b51f05d7062a67b5972569cb506ebdc79841259c2891c69930f43cb012f13964aecbae07fc4dfd69ed42552c5ef6a6e5cb2659be39bf303980822c154bbf921e5e9c90907f13dc4fe273a8587ad3c68f4db154296ffd69634392f306a8e5437567f5331977b89a775a00785e4cf8aec32830fa19c466d47f27985ffe1b4fadb87509b108a1defbc843ef668b007baaac1f47faf0c76195035983dee56ed30a45304a76621837a0b4459a97d9621b77d409717c73da475f632249d2bd585f1135988ce1a646a89283197e286b6225b2da8038ad6addb1fae38ed70f602ed12dddf1dc882c43bc0c595bd09814d4947a2834e5f212632649c30420e645887a3c1e9b90e1cda9bb601a34bc284d561d09c4deb70d7e2e3aae21b0eed09f36abf75091440541387f21bbf91904376333d9bacf4a899fcec5779af24bcbe0a12956a3d737aa4a86b777d62be8b4e110719b5704c6ce609893618e8a3953c8421aa917eb9e9f7a723e04d218a3fe31213cfeb26c441b67e2c62890343a212302a13ec45fcce4058abe9206a224f27ff5aa7ec3b227a8226ee02b07cb2978ee85aa16fe47834fa14393f91a6b20a688187822e6a60b1a6a9ee5e6d9ef51729158382e91ddb8cc40399eddbcb5b54fa77df6ec688f314e0d2dc180d3fa527fc8c62694637a47fb2a90db327dc94d0070ea2bc0388106a95bb6094af5d1773778166dd4ba45180f7ba346d161536d3a426c62803f6eaa8caa7c8cb63117d37bbc9fe14fd7d71b517ab343e252a6b502e87f86b042bd551760ff6fb43a44333dc175cc19397f277e5df86d661eda949b52568925fc9baeffd01f57bd565d0894b69cf2b551760a9dd48b0049f9b3f404a43600e14258103ac80b39d834c6545411235ba0ac7e1b4b18b5e03015d28a667f19a98709ebb88a1ec5baf81388cf393e3e87c8dc6042b828364a2f0e7b7482f3c14b3964af9badbf9facf73cad5f274f6d5ced8adbda259223395c41d967b0be8907fc57c2d7d190a60d1d055514b46af62baf62724139f0eb2889c3c261de7f4371d3b3ab7538c38c26df8c01a8336f43f571f083f868c29356bd8f8f695199948e42dd2cc18ce9c202a9f4ab252b93a17e9719cc4f50d2530f0fcfaf403edee152bbd01084862f2cad277129b51630b9ac63a11e46815b1d0bc8100add481256eff44e1e7139e18341316b3ec1d923cc92a8c08d7d7ca98c7f71f2128656ead3a5b694088488cb0f3a21f9e884943a502e5173875e5173482df5d14dcb8cb745fd1670f708ba19dd2d7a22619e6a07a96f4c5e41960310d53c9124fc3cb04aafdadecda32ea350bc97d8ba47ce3cc50d6b6224024f1520fea37f10e0ab91498b6c0f5acef74208594cca917bfa8ab360c8cb5b23a7dc5c4f3913c0294794aa1474ef61891a63a7d1173054ec3b4f632a5a701a37fb167b5686404bada7304be865db17fc9e6207a77a30ade102faaad2c2201f95f801c5889fbf5faafacca88a8ee7274a1b5c7d93d3e20a212e08050476b635180caf170b5f2bf0bf2a26015b7ae5e5a8c8a2386467019a8741555f802aaa39672eecdd2855a384d8790346864cd1166a1927f93642b188c68d42f6cb237d8daf5afe3b0ff28cc7afea6c13c100710fc89ebe51e2fc673a058b8d01835f3695977565b387444b55b7fdf1c190ce6ce80d416622689292ef2c90f34c3d642b55d740032f5105908caf4c7373c5eeaebb353c18215ad6d7466434bdb4a42c188e76190ff7e889619d1be17aa45ce7d1b614aec5a117474d9b8f6385d331dd514fa4414399f20025abc86f2e11af63bf1fb6e5bab5284ec2eeaad5f79ea8d5f0b7f22230864104bc091491c084b1ce1ae2f66689a8d2a6a514745f65c3d439f05968840b48a61c96a56c00ae4c76d72962aa51cf3c3deaeb2c99f29a69f6cd6b69dd108a358f21f69103d9dbeaedc207d7fbf318afdfd24a4fa9030ca5c51d669d65bbeb7a08451160c8046c244886f38d12368a2be93663b57dc51b26c024a290554afadb5dab0c71174d9de3f178ad5506d157e9f5b8af89169120bd53388ff96589eaf3a2da85a475837ac7f2f3f934d95f0c126a73ff79104387c3a21661351987b0604e50a72511f1ec02b2ba9c10973132ed2463abc33b86e92313a946124c18bf9adea86b49d840ae34ad10aaf47e4892ff31cabb6d7a05343b7d1188c16fcb06b858a75ea29a3c1e830ab730beae342a8ad20b9537049f45204c7d2a3d89d3c3d8e2e666ce5c08097a37c39b7a74cb2cdc60d67183e0bb63d8a7e6f2615dc1cd26c27e3699d4c93d82cfd1e46707401832b0bfced793fe83adad0de29cd0fcb8a14e9f31f44a76ac9634ac45b0b8c2397e4dea50338fd109709affbc0b99c24d958a152722e0a3c777a0a50a4a58f7825e435e4694b36dac1e0e9cb21584f2ae7f3f993c88021ad7a60a254ffa128d82213554624b32b87946ea6f81a98ed89b1b05f63bae637c5648c413262ad4d8d9935db68aadb19ff37061e84f3485fde4b93170b862c02c4779f27f915353b33b272d709898d9cc8deb99d96581358177e404c2566ab9ed79fa2a2bcdbefe88ed608e30edc3d757f1c3af2345a6d7bd2c121334a8b1197f43a2081e333fec4e74da1f2f82f632e2dc3a5789123fbcb7651edd85823af20fcd123c6606a8461776f574856ce06ecb68e658bf88d78938c759366cc9e3695382357cc7efd90359a58b47f4b4a554af3980d02506ad34c40bdf9be48fbc343d1d8048c461675c68ff8a807641c0147a0dbd440b0ee85be32d118039ef496d8e589ae11673ad099ca28e518ae8e68b0fc09dc470c3b4b5fe088a6747b42b509eddc2ccdefc94df1804855269acb8747fa3166d66a37b74ceb4363e6a28a2fa4f83e5e80f3e5605dde6da71e1f9cff3e1ea9bb28179f7dc3ea6de01b2150e1b54937fde920d3fe14194e157033b67ad41b11b118b61e646aee93cb03656ffb4c35aa37d4c33dcd80aab5075bff8e43802a3574b4e308057abe852828a785a37e016894a017e90874fb697e999f3fd40264a4a24c52876744dcfcf9dd328071d8d4f739d887e370bb4c29964cca3cd82af74ceb2a70579acc6318772aec210ae5d2971446b9f7a7960a16bb60d6770789715c5673b26be28298fc209b60f168a52fcdc8f297316287315ddd14f118247f13c05a7c3b344aac23df02d837f335d38a6f4490a217c77ee7c5675b77b44fd5a0f78c189ea96562cae8f9a798b8d5c3bf644bc77b0fc72f72df79585fedb10a76d91819b25c249b35c2673ae69fceacb88f5c0027b8b845f60dc3264fe47c6949a7dee603c9c187d5d99d892b29fe40489752e37b636bf1f4246f23be3079ea833bc8bcd80b9d9bcc4dcc02e22b811807c95d7dda2843493d215c31a235227c4ccb063b082b312ff33bb594003adeab9207476f18326fe62ad5e008a97ff5e0e50fe96e32f55f437c6d6cd0d7ebd4cc6517dece6e6f1c720a150b7f4a5f5f28a9780fb56ab5c32df7e7ff13947597f45aa512b6de36dd59f1f044776977ee2f238549c1800fd4eefcc4c499a327bd6ca27b9cc979cb69d504d85e5e128d3e297b977194fb7554082cd183a0473af811bda583d23f147ff56b72e06dc3aa0076af93a4fcb5f0cdfa008ad3184ce6c6a68424ea7f5482e5eeb42aeb05c95f50caa684d6684b630898ce9c723e7904fe5a457675cebf41bb41c02af02854b261e871bf7dbd2b22a05735581b01adede56228d1cccc9238696c09636bebafd169afb1b2f1650d47ec3da71d4c8d8283ea6ba43ab4370f064f5a6e18abe94a7b1ee9bd53100d8d8c9d5e79e5e95568a4cc3b9b1ce4bcac007609f883c95c5f1b6c0ef1d9ccb1d673e9cb07323db304fdcd60913e28179e733abe9766818e4368780ca90ce1653e458baa56fbcd7707db40b3165d6dd1a4f0bb111893119ed68b52a4b98da60d211487dced8c034a7f1d6300c09fde3b9ca31b6e2ee8425a175ec4797e0429363e11a718e18c1e516f2c4f303468963c3e1887ff47ddafc4307165ea66de9115a39f3f19cdc6f312f8ff22eb29eb25787002e1f06e25f7e9f2b8da9f41c18f046824a4863ac9d298e12a76215cbd76f8cce2521326bea06aff6ee86c3b30eb7f28b6c39f3e70ae427b7e7e222f1dc3191db59de23b6a339c71fefd34037320b7f0c09e1523fb91d70348bb578100369b60e97e8172e9099785e29f4f6753d9bcb849ac4247c496ab87e02373d85f47a6da29bd16fc6373eff8276a0a2b97693042df933dfa4cfa81c922041a13f07bf9a7ae2ba680470476f6fdcc35b30fcb90c70444378e7573e97aab47b7bc884c047c3d9691e1f8fb4d99de460c88c04548e15fd103561dfbd6dfaf532f1e90baf76d1b7b990925f377c94d5b72c58e2a163c130784c41c6742fbedee085603a81ae11d7433f22c1515a027289e729b8020fdd41b0ec1f1c64f24eaca8844c5a3be18d81a10092b279632f19115b4f1ba3ce98adc52ae09c6fd41b6057c8125b040020ea577ca2986779", 0x1000}, {&(0x7f0000002140)="924a6f5760e8c265e6c8eada8ac91605942aa8931eff9ac125e401423f68975313d06fecd61be1130b3e98deab7757b54b81134207bf511b5b5b5a3a0367ce18fe526c9b444fec657643448e0f673d2930e44dfde78469229f146a636450cd80bc16d340df986450ca58c699c6d1bb3395742a7bc67a14d0e4cbb47d1d304e6ba4991894a128856089dd42fbbf03b673ed74aa0e7e3cc2c1e6879d7ac4f3f57bbfc2bfff5f93cf8b5d294c6acfb4319f061c0235fdf16f7242017e5ab4dde5e929785f", 0xc3}, {&(0x7f0000000a40)="93f68fa51bff56684330337e92", 0xd}], 0x8, &(0x7f0000002d40)=ANY=[@ANYBLOB="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"], 0x330, 0x4000000}, 0x8000) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:53 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:53 executing program 6: socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001f40)) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r2 = getpid() setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r0, 0x4) r3 = perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x100, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r2, 0x0, r0, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x7fffffff, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x30, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x0, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0x1003, 0x81, 0x7, 0x0, 0x7, 0x6}, r2, 0xa, r3, 0x1) r4 = gettid() r5 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1}, r4, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000280)=r1, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r1}, 0xb) perf_event_open(&(0x7f0000001c80)={0x2, 0x70, 0x1, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r4, 0xf, r1, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x70, 0x5, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x40, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x3, 0x7fff, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x1000, 0x0, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r4, 0xd, r5, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x1000020, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) r6 = perf_event_open(&(0x7f0000cccf88)={0x2, 0x78, 0xe12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x3) r8 = getpid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r7, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x3ff) r9 = perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x100, 0x0, 0x6, 0x1ff, 0x0, 0x10000, 0x3500b, 0x200000000008, 0x2, 0x9, 0x2, 0xa, 0x7, 0x40, 0xa9, 0x8, 0x42, 0x400, 0x81, 0x0, 0x3f, 0xffffffffffff494b, 0x800, 0xfffffffffffff800, 0x0, 0x8, 0x16b, 0x800, 0x100000, 0x1ff, 0x46, 0x100, 0x200, 0x0, 0x401f, 0x10000, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x4}, 0x29620, 0xfffffffffffff60c, 0x5, 0x6, 0x4, 0x1, 0x7}, r8, 0x1, r7, 0xa) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000001000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x70, 0xe0, 0x8, 0x5, 0x3, 0x0, 0x7, 0x40084, 0x2, 0xee, 0xfffffffffffffffd, 0x4, 0x3, 0xffffffff00000000, 0x6, 0xd67, 0x4, 0x4, 0x1, 0x9, 0x10000, 0x1, 0x80000000, 0x8000000, 0x1, 0x1, 0x10000, 0x81, 0x9, 0x3, 0x0, 0x1, 0x101, 0x81, 0xfffffffffffffffd, 0x1f, 0x40, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000340), 0x1}, 0x10002, 0x100, 0x6, 0x1, 0x2, 0x2, 0x8}, r8, 0x10, r9, 0x0) 2018/03/30 02:11:53 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[]}, 0x810) 2018/03/30 02:11:54 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[]}, 0x810) [ 353.250213] FAULT_INJECTION: forcing a failure. [ 353.250213] name failslab, interval 1, probability 0, space 0, times 0 [ 353.261528] CPU: 1 PID: 19965 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 353.268794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.278140] Call Trace: [ 353.280727] dump_stack+0x194/0x24d [ 353.284363] ? arch_local_irq_restore+0x53/0x53 [ 353.289027] ? __save_stack_trace+0x7e/0xd0 [ 353.293364] should_fail+0x8c0/0xa40 [ 353.297078] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 353.302179] ? kasan_kmalloc+0xad/0xe0 [ 353.306058] ? kmem_cache_alloc_trace+0x136/0x740 [ 353.310890] ? __memcg_init_list_lru_node+0x169/0x270 [ 353.316070] ? __list_lru_init+0x544/0x750 [ 353.320296] ? sget_userns+0x6b1/0xe40 [ 353.324183] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 353.328931] ? do_mount+0xea4/0x2bb0 [ 353.332639] ? SyS_mount+0xab/0x120 [ 353.336261] ? do_syscall_64+0x281/0x940 [ 353.340312] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.345676] ? find_held_lock+0x35/0x1d0 [ 353.349735] ? __lock_is_held+0xb6/0x140 [ 353.353810] ? check_same_owner+0x320/0x320 [ 353.358127] ? rcu_note_context_switch+0x710/0x710 [ 353.363061] should_failslab+0xec/0x120 [ 353.367024] kmem_cache_alloc_trace+0x4b/0x740 [ 353.371595] ? __kmalloc_node+0x33/0x70 [ 353.375574] __memcg_init_list_lru_node+0x169/0x270 [ 353.380586] ? list_lru_add+0x7c0/0x7c0 [ 353.384551] ? __kmalloc_node+0x47/0x70 [ 353.388527] __list_lru_init+0x544/0x750 [ 353.392586] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 353.398462] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 353.403477] ? lockdep_init_map+0x9/0x10 [ 353.407532] sget_userns+0x6b1/0xe40 [ 353.411231] ? set_anon_super+0x20/0x20 [ 353.415202] ? put_filp+0x90/0x90 [ 353.418647] ? destroy_unused_super.part.6+0xd0/0xd0 [ 353.423736] ? alloc_vfsmnt+0x762/0x9c0 [ 353.427693] ? path_lookupat+0x238/0xba0 [ 353.431741] ? mnt_free_id.isra.21+0x50/0x50 [ 353.436146] ? trace_hardirqs_off+0x10/0x10 [ 353.440458] ? putname+0xee/0x130 [ 353.443906] ? cap_capable+0x1b5/0x230 [ 353.447790] ? security_capable+0x8e/0xc0 [ 353.451933] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 353.457107] ? ns_capable_common+0xcf/0x160 [ 353.461424] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 353.466598] mount_ns+0x6d/0x190 [ 353.469963] rpc_mount+0x9e/0xd0 [ 353.473320] mount_fs+0x66/0x2d0 [ 353.476684] vfs_kern_mount.part.26+0xc6/0x4a0 [ 353.481257] ? may_umount+0xa0/0xa0 [ 353.484874] ? _raw_read_unlock+0x22/0x30 [ 353.489009] ? __get_fs_type+0x8a/0xc0 [ 353.492896] do_mount+0xea4/0x2bb0 [ 353.496420] ? __might_fault+0x110/0x1d0 [ 353.500477] ? copy_mount_string+0x40/0x40 [ 353.504699] ? check_same_owner+0x320/0x320 [ 353.509006] ? __check_object_size+0x8b/0x530 [ 353.513502] ? __might_sleep+0x95/0x190 [ 353.517474] ? kasan_check_write+0x14/0x20 [ 353.521699] ? _copy_from_user+0x99/0x110 [ 353.525839] ? memdup_user+0x5e/0x90 [ 353.529540] ? copy_mount_options+0x1f7/0x2e0 [ 353.534034] SyS_mount+0xab/0x120 [ 353.537471] ? copy_mnt_ns+0xb30/0xb30 [ 353.541353] do_syscall_64+0x281/0x940 [ 353.545227] ? __do_page_fault+0xc90/0xc90 [ 353.549444] ? _raw_spin_unlock_irq+0x27/0x70 [ 353.553925] ? finish_task_switch+0x1c1/0x7e0 [ 353.558408] ? syscall_return_slowpath+0x550/0x550 [ 353.563325] ? syscall_return_slowpath+0x2ac/0x550 [ 353.568242] ? prepare_exit_to_usermode+0x350/0x350 [ 353.573247] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 353.578606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.583453] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.588632] RIP: 0033:0x4548b9 [ 353.591808] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 02:11:54 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:54 executing program 1 (fault-call:15 fault-nth:50): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:54 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x0, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 353.599540] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 353.606797] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 353.614052] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 353.621311] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 353.628565] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000031 2018/03/30 02:11:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940), 0x0, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:54 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:54 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x6, 0x1, 0x3, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x1200000000000005, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 353.924549] FAULT_INJECTION: forcing a failure. [ 353.924549] name failslab, interval 1, probability 0, space 0, times 0 [ 353.935861] CPU: 1 PID: 19983 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 353.943123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.952457] Call Trace: [ 353.955295] dump_stack+0x194/0x24d [ 353.958916] ? arch_local_irq_restore+0x53/0x53 [ 353.963572] ? __save_stack_trace+0x7e/0xd0 [ 353.967901] should_fail+0x8c0/0xa40 [ 353.971610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 353.976699] ? kasan_kmalloc+0xad/0xe0 [ 353.980572] ? kmem_cache_alloc_trace+0x136/0x740 [ 353.985404] ? __memcg_init_list_lru_node+0x169/0x270 [ 353.990581] ? __list_lru_init+0x544/0x750 [ 353.994802] ? sget_userns+0x6b1/0xe40 [ 353.998678] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 354.003415] ? do_mount+0xea4/0x2bb0 [ 354.007116] ? SyS_mount+0xab/0x120 [ 354.010727] ? do_syscall_64+0x281/0x940 [ 354.014775] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.020139] ? find_held_lock+0x35/0x1d0 [ 354.024195] ? __lock_is_held+0xb6/0x140 [ 354.028265] ? check_same_owner+0x320/0x320 [ 354.032583] ? rcu_note_context_switch+0x710/0x710 [ 354.037518] should_failslab+0xec/0x120 [ 354.041495] kmem_cache_alloc_trace+0x4b/0x740 [ 354.046066] ? __kmalloc_node+0x33/0x70 [ 354.050030] ? __kmalloc_node+0x33/0x70 [ 354.053996] ? rcu_read_lock_sched_held+0x108/0x120 [ 354.059012] __memcg_init_list_lru_node+0x169/0x270 [ 354.064023] ? list_lru_add+0x7c0/0x7c0 [ 354.067985] ? __kmalloc_node+0x47/0x70 [ 354.071962] __list_lru_init+0x544/0x750 [ 354.076025] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 354.081904] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 354.086919] ? lockdep_init_map+0x9/0x10 [ 354.090978] sget_userns+0x6b1/0xe40 [ 354.094676] ? set_anon_super+0x20/0x20 [ 354.098646] ? put_filp+0x90/0x90 [ 354.102095] ? destroy_unused_super.part.6+0xd0/0xd0 [ 354.107197] ? alloc_vfsmnt+0x762/0x9c0 [ 354.111163] ? path_lookupat+0x238/0xba0 [ 354.115221] ? mnt_free_id.isra.21+0x50/0x50 [ 354.119623] ? trace_hardirqs_off+0x10/0x10 [ 354.123936] ? putname+0xee/0x130 [ 354.127392] ? cap_capable+0x1b5/0x230 [ 354.131274] ? security_capable+0x8e/0xc0 [ 354.135412] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 354.140591] ? ns_capable_common+0xcf/0x160 [ 354.144897] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 354.150068] mount_ns+0x6d/0x190 [ 354.153418] rpc_mount+0x9e/0xd0 [ 354.156767] mount_fs+0x66/0x2d0 [ 354.160125] vfs_kern_mount.part.26+0xc6/0x4a0 [ 354.164703] ? may_umount+0xa0/0xa0 [ 354.168327] ? _raw_read_unlock+0x22/0x30 [ 354.172542] ? __get_fs_type+0x8a/0xc0 [ 354.176415] do_mount+0xea4/0x2bb0 [ 354.179940] ? __might_fault+0x110/0x1d0 [ 354.183989] ? copy_mount_string+0x40/0x40 [ 354.188204] ? check_same_owner+0x320/0x320 [ 354.192509] ? __check_object_size+0x8b/0x530 [ 354.196988] ? __might_sleep+0x95/0x190 [ 354.200949] ? kasan_check_write+0x14/0x20 [ 354.205165] ? _copy_from_user+0x99/0x110 [ 354.209291] ? memdup_user+0x5e/0x90 [ 354.212978] ? copy_mount_options+0x1f7/0x2e0 [ 354.217456] SyS_mount+0xab/0x120 [ 354.220892] ? copy_mnt_ns+0xb30/0xb30 [ 354.224766] do_syscall_64+0x281/0x940 [ 354.228627] ? __do_page_fault+0xc90/0xc90 [ 354.232840] ? _raw_spin_unlock_irq+0x27/0x70 [ 354.237323] ? finish_task_switch+0x1c1/0x7e0 [ 354.241806] ? syscall_return_slowpath+0x550/0x550 [ 354.246716] ? syscall_return_slowpath+0x2ac/0x550 [ 354.251641] ? prepare_exit_to_usermode+0x350/0x350 [ 354.256637] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 354.261981] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.266807] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.271970] RIP: 0033:0x4548b9 [ 354.275132] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 354.282813] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 354.290057] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 354.297301] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 354.304542] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 354.311793] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000032 [ 354.456450] IPVS: ftp: loaded support on port[0] = 21 [ 354.483887] IPVS: ftp: loaded support on port[0] = 21 [ 354.558966] cgroup: cgroup2: unknown option "./file0/" 2018/03/30 02:11:55 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:55 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x5, 0x5, 0x3, 0x0, 0x7f, 0x10, 0x5, 0x6, 0x3f, 0x5, 0x1ff, 0x100000000, 0x1, 0x4, 0x0, 0x0, 0xfffffffffffffff7, 0x9, 0x3, 0x1000, 0x6, 0x100, 0x4c6, 0x10000, 0x6, 0x154, 0x7, 0x1, 0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0xfd, 0x6, 0x1, 0x2}, 0x0, 0xb, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x803, 0x5, &(0x7f0000000300)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xe84849091c49ef6d, 0xb, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48d}, [@call={0x85, 0x0, 0x0, 0x3b}, @call={0x85, 0x0, 0x0, 0xa}, @jmp={0x5, 0x10000, 0xf, 0xe, 0x0, 0xffffffff, 0xfffffffffffffff8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}], {0x95}}, &(0x7f0000000240)='syzkaller\x00', 0x3cde50ad, 0x5a, &(0x7f0000000280)=""/90, 0x40f00}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000180)='./file0\x00'}, 0x10) socketpair(0x21, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) 2018/03/30 02:11:55 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 1 (fault-call:15 fault-nth:51): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x0) 2018/03/30 02:11:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 354.795498] FAULT_INJECTION: forcing a failure. [ 354.795498] name failslab, interval 1, probability 0, space 0, times 0 [ 354.806908] CPU: 1 PID: 20017 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 354.814171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.823517] Call Trace: [ 354.826098] dump_stack+0x194/0x24d [ 354.829723] ? arch_local_irq_restore+0x53/0x53 [ 354.834377] ? __save_stack_trace+0x7e/0xd0 [ 354.838705] should_fail+0x8c0/0xa40 [ 354.842412] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 354.847502] ? kasan_kmalloc+0xad/0xe0 [ 354.851377] ? kmem_cache_alloc_trace+0x136/0x740 [ 354.856205] ? __memcg_init_list_lru_node+0x169/0x270 [ 354.861379] ? __list_lru_init+0x544/0x750 [ 354.865595] ? sget_userns+0x6b1/0xe40 [ 354.869471] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 354.874209] ? do_mount+0xea4/0x2bb0 [ 354.877909] ? SyS_mount+0xab/0x120 [ 354.881523] ? do_syscall_64+0x281/0x940 [ 354.885568] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.890936] ? find_held_lock+0x35/0x1d0 [ 354.895004] ? __lock_is_held+0xb6/0x140 [ 354.899080] ? check_same_owner+0x320/0x320 [ 354.903400] ? rcu_note_context_switch+0x710/0x710 [ 354.908336] should_failslab+0xec/0x120 [ 354.912301] kmem_cache_alloc_trace+0x4b/0x740 [ 354.916881] ? __kmalloc_node+0x33/0x70 [ 354.920846] ? __kmalloc_node+0x33/0x70 [ 354.924809] ? rcu_read_lock_sched_held+0x108/0x120 [ 354.929834] __memcg_init_list_lru_node+0x169/0x270 [ 354.934850] ? list_lru_add+0x7c0/0x7c0 [ 354.938812] ? __kmalloc_node+0x47/0x70 2018/03/30 02:11:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 354.942789] __list_lru_init+0x544/0x750 [ 354.946854] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 354.952734] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 354.957759] ? lockdep_init_map+0x9/0x10 [ 354.961820] sget_userns+0x6b1/0xe40 [ 354.965528] ? set_anon_super+0x20/0x20 [ 354.969516] ? put_filp+0x90/0x90 [ 354.972963] ? destroy_unused_super.part.6+0xd0/0xd0 [ 354.978057] ? alloc_vfsmnt+0x762/0x9c0 [ 354.982020] ? path_lookupat+0x238/0xba0 [ 354.986076] ? mnt_free_id.isra.21+0x50/0x50 [ 354.990486] ? trace_hardirqs_off+0x10/0x10 [ 354.994804] ? putname+0xee/0x130 [ 354.998255] ? cap_capable+0x1b5/0x230 [ 355.002141] ? security_capable+0x8e/0xc0 [ 355.006285] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 355.011464] ? ns_capable_common+0xcf/0x160 [ 355.015782] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 355.020957] mount_ns+0x6d/0x190 [ 355.024318] rpc_mount+0x9e/0xd0 [ 355.027676] mount_fs+0x66/0x2d0 [ 355.031039] vfs_kern_mount.part.26+0xc6/0x4a0 [ 355.035616] ? may_umount+0xa0/0xa0 [ 355.039229] ? _raw_read_unlock+0x22/0x30 [ 355.043364] ? __get_fs_type+0x8a/0xc0 [ 355.047250] do_mount+0xea4/0x2bb0 [ 355.050776] ? __might_fault+0x110/0x1d0 [ 355.054835] ? copy_mount_string+0x40/0x40 [ 355.059060] ? check_same_owner+0x320/0x320 [ 355.063373] ? __check_object_size+0x8b/0x530 [ 355.067868] ? __might_sleep+0x95/0x190 [ 355.071840] ? kasan_check_write+0x14/0x20 [ 355.076064] ? _copy_from_user+0x99/0x110 [ 355.080206] ? memdup_user+0x5e/0x90 [ 355.083907] ? copy_mount_options+0x1f7/0x2e0 [ 355.088400] SyS_mount+0xab/0x120 [ 355.091840] ? copy_mnt_ns+0xb30/0xb30 [ 355.095718] do_syscall_64+0x281/0x940 [ 355.099591] ? __do_page_fault+0xc90/0xc90 [ 355.103812] ? _raw_spin_unlock_irq+0x27/0x70 [ 355.108298] ? finish_task_switch+0x1c1/0x7e0 [ 355.112785] ? syscall_return_slowpath+0x550/0x550 [ 355.117703] ? syscall_return_slowpath+0x2ac/0x550 [ 355.122625] ? prepare_exit_to_usermode+0x350/0x350 [ 355.127628] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 355.132987] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.137828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.143004] RIP: 0033:0x4548b9 2018/03/30 02:11:55 executing program 1 (fault-call:15 fault-nth:52): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 355.146184] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 355.153887] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 355.161149] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 355.168408] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 355.175669] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 355.182928] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000033 2018/03/30 02:11:55 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f0000000400)='./file0\x00', 0xaf) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000040)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x7, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000e40)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r6, &(0x7f00000015c0)="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", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x7, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:56 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:56 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x0) [ 355.451784] FAULT_INJECTION: forcing a failure. [ 355.451784] name failslab, interval 1, probability 0, space 0, times 0 [ 355.463080] CPU: 1 PID: 20038 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 355.470345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.479685] Call Trace: [ 355.482272] dump_stack+0x194/0x24d [ 355.485904] ? arch_local_irq_restore+0x53/0x53 [ 355.490566] ? __save_stack_trace+0x7e/0xd0 [ 355.494895] should_fail+0x8c0/0xa40 [ 355.498612] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 355.503712] ? kasan_kmalloc+0xad/0xe0 [ 355.507591] ? kmem_cache_alloc_trace+0x136/0x740 [ 355.512425] ? __memcg_init_list_lru_node+0x169/0x270 [ 355.517609] ? __list_lru_init+0x544/0x750 [ 355.521835] ? sget_userns+0x6b1/0xe40 [ 355.525720] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 355.530471] ? do_mount+0xea4/0x2bb0 [ 355.534179] ? SyS_mount+0xab/0x120 [ 355.537794] ? do_syscall_64+0x281/0x940 [ 355.541847] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.547215] ? find_held_lock+0x35/0x1d0 [ 355.551282] ? __lock_is_held+0xb6/0x140 [ 355.555355] ? check_same_owner+0x320/0x320 [ 355.559673] ? rcu_note_context_switch+0x710/0x710 [ 355.564608] should_failslab+0xec/0x120 [ 355.568575] kmem_cache_alloc_trace+0x4b/0x740 [ 355.573147] ? __kmalloc_node+0x33/0x70 [ 355.577109] ? __kmalloc_node+0x33/0x70 [ 355.581073] ? rcu_read_lock_sched_held+0x108/0x120 [ 355.586088] __memcg_init_list_lru_node+0x169/0x270 [ 355.591103] ? list_lru_add+0x7c0/0x7c0 [ 355.595066] ? __kmalloc_node+0x47/0x70 [ 355.599045] __list_lru_init+0x544/0x750 [ 355.603110] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 355.608988] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 355.614004] ? lockdep_init_map+0x9/0x10 [ 355.618059] sget_userns+0x6b1/0xe40 [ 355.621757] ? set_anon_super+0x20/0x20 [ 355.625728] ? put_filp+0x90/0x90 [ 355.629177] ? destroy_unused_super.part.6+0xd0/0xd0 [ 355.634273] ? alloc_vfsmnt+0x762/0x9c0 [ 355.638241] ? path_lookupat+0x238/0xba0 [ 355.642297] ? mnt_free_id.isra.21+0x50/0x50 [ 355.646707] ? trace_hardirqs_off+0x10/0x10 [ 355.651028] ? putname+0xee/0x130 [ 355.654482] ? cap_capable+0x1b5/0x230 [ 355.658376] ? security_capable+0x8e/0xc0 [ 355.662527] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 355.667707] ? ns_capable_common+0xcf/0x160 [ 355.672026] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 355.677209] mount_ns+0x6d/0x190 [ 355.680573] rpc_mount+0x9e/0xd0 [ 355.683940] mount_fs+0x66/0x2d0 [ 355.687308] vfs_kern_mount.part.26+0xc6/0x4a0 [ 355.691887] ? may_umount+0xa0/0xa0 [ 355.695507] ? _raw_read_unlock+0x22/0x30 2018/03/30 02:11:56 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 355.699641] ? __get_fs_type+0x8a/0xc0 [ 355.703522] do_mount+0xea4/0x2bb0 [ 355.707051] ? __might_fault+0x110/0x1d0 [ 355.711098] ? copy_mount_string+0x40/0x40 [ 355.715325] ? check_same_owner+0x320/0x320 [ 355.719632] ? __check_object_size+0x8b/0x530 [ 355.724129] ? __might_sleep+0x95/0x190 [ 355.728105] ? kasan_check_write+0x14/0x20 [ 355.732326] ? _copy_from_user+0x99/0x110 [ 355.736473] ? memdup_user+0x5e/0x90 [ 355.740176] ? copy_mount_options+0x1f7/0x2e0 [ 355.744669] SyS_mount+0xab/0x120 [ 355.748116] ? copy_mnt_ns+0xb30/0xb30 [ 355.751994] do_syscall_64+0x281/0x940 [ 355.755869] ? __do_page_fault+0xc90/0xc90 [ 355.760088] ? _raw_spin_unlock_irq+0x27/0x70 [ 355.764560] ? finish_task_switch+0x1c1/0x7e0 [ 355.769046] ? syscall_return_slowpath+0x550/0x550 [ 355.773963] ? syscall_return_slowpath+0x2ac/0x550 [ 355.778873] ? prepare_exit_to_usermode+0x350/0x350 [ 355.783878] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 355.789241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.794090] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.799262] RIP: 0033:0x4548b9 [ 355.802436] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 355.810121] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 355.817367] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 355.824620] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 355.831873] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 355.839124] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000034 [ 355.989337] IPVS: ftp: loaded support on port[0] = 21 [ 356.053829] cgroup: cgroup2: unknown option "./file0/" [ 356.832919] IPVS: ftp: loaded support on port[0] = 21 [ 356.903632] can: request_module (can-proto-5) failed. 2018/03/30 02:11:57 executing program 1 (fault-call:15 fault-nth:53): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:57 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:57 executing program 6: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) gettid() perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x80) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000001740)='./file0\x00', &(0x7f0000000040)='cgroup\x00', 0x3441, &(0x7f0000001700)) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000027c0)) 2018/03/30 02:11:57 executing program 3 (fault-call:22 fault-nth:0): mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x810) 2018/03/30 02:11:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x80000001, 0x8000000000000001, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={r5, 0x100000001, 0x80012}, 0xff45) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000001140)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000040)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:57 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0x0, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:57 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 356.925673] can: request_module (can-proto-5) failed. 2018/03/30 02:11:57 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 357.089266] FAULT_INJECTION: forcing a failure. [ 357.089266] name failslab, interval 1, probability 0, space 0, times 0 [ 357.100564] CPU: 1 PID: 20086 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 357.107827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.117169] Call Trace: [ 357.119756] dump_stack+0x194/0x24d [ 357.123388] ? arch_local_irq_restore+0x53/0x53 [ 357.128048] ? __save_stack_trace+0x7e/0xd0 [ 357.132382] should_fail+0x8c0/0xa40 [ 357.136100] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 357.141200] ? kasan_kmalloc+0xad/0xe0 [ 357.145081] ? kmem_cache_alloc_trace+0x136/0x740 [ 357.149922] ? __memcg_init_list_lru_node+0x169/0x270 [ 357.155104] ? __list_lru_init+0x544/0x750 [ 357.159332] ? sget_userns+0x6b1/0xe40 [ 357.163212] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 357.167958] ? do_mount+0xea4/0x2bb0 [ 357.171657] ? SyS_mount+0xab/0x120 [ 357.175271] ? do_syscall_64+0x281/0x940 [ 357.179329] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.184696] ? find_held_lock+0x35/0x1d0 [ 357.188760] ? __lock_is_held+0xb6/0x140 [ 357.192833] ? check_same_owner+0x320/0x320 [ 357.197152] ? rcu_note_context_switch+0x710/0x710 [ 357.202085] should_failslab+0xec/0x120 [ 357.206055] kmem_cache_alloc_trace+0x4b/0x740 [ 357.210624] ? __kmalloc_node+0x33/0x70 [ 357.214588] ? __kmalloc_node+0x33/0x70 [ 357.218554] ? rcu_read_lock_sched_held+0x108/0x120 [ 357.223575] __memcg_init_list_lru_node+0x169/0x270 [ 357.228592] ? list_lru_add+0x7c0/0x7c0 [ 357.232555] ? __kmalloc_node+0x47/0x70 [ 357.236538] __list_lru_init+0x544/0x750 [ 357.240607] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 357.246489] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 357.251509] ? lockdep_init_map+0x9/0x10 [ 357.255569] sget_userns+0x6b1/0xe40 [ 357.259278] ? set_anon_super+0x20/0x20 [ 357.263256] ? put_filp+0x90/0x90 [ 357.266702] ? destroy_unused_super.part.6+0xd0/0xd0 [ 357.271799] ? alloc_vfsmnt+0x762/0x9c0 [ 357.275763] ? path_lookupat+0x238/0xba0 [ 357.279817] ? mnt_free_id.isra.21+0x50/0x50 [ 357.284229] ? trace_hardirqs_off+0x10/0x10 2018/03/30 02:11:58 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 357.288549] ? putname+0xee/0x130 [ 357.292006] ? cap_capable+0x1b5/0x230 [ 357.295899] ? security_capable+0x8e/0xc0 [ 357.300049] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 357.305228] ? ns_capable_common+0xcf/0x160 [ 357.309550] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 357.314736] mount_ns+0x6d/0x190 [ 357.318107] rpc_mount+0x9e/0xd0 [ 357.321472] mount_fs+0x66/0x2d0 [ 357.324841] vfs_kern_mount.part.26+0xc6/0x4a0 [ 357.329421] ? may_umount+0xa0/0xa0 [ 357.333046] ? _raw_read_unlock+0x22/0x30 [ 357.337190] ? __get_fs_type+0x8a/0xc0 [ 357.341082] do_mount+0xea4/0x2bb0 [ 357.344615] ? __might_fault+0x110/0x1d0 [ 357.348686] ? copy_mount_string+0x40/0x40 [ 357.352913] ? check_same_owner+0x320/0x320 [ 357.357228] ? __check_object_size+0x8b/0x530 [ 357.361729] ? __might_sleep+0x95/0x190 [ 357.365706] ? kasan_check_write+0x14/0x20 [ 357.369938] ? _copy_from_user+0x99/0x110 [ 357.374086] ? memdup_user+0x5e/0x90 [ 357.377790] ? copy_mount_options+0x1f7/0x2e0 [ 357.382284] SyS_mount+0xab/0x120 [ 357.385732] ? copy_mnt_ns+0xb30/0xb30 [ 357.389617] do_syscall_64+0x281/0x940 [ 357.393495] ? __do_page_fault+0xc90/0xc90 [ 357.397716] ? _raw_spin_unlock_irq+0x27/0x70 [ 357.402204] ? finish_task_switch+0x1c1/0x7e0 [ 357.406694] ? syscall_return_slowpath+0x550/0x550 [ 357.411616] ? syscall_return_slowpath+0x2ac/0x550 [ 357.416535] ? prepare_exit_to_usermode+0x350/0x350 [ 357.421547] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 357.426911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.431754] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.436932] RIP: 0033:0x4548b9 [ 357.440110] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 357.447814] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 357.455072] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 357.462330] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 357.469589] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 357.476852] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000035 [ 358.755337] IPVS: ftp: loaded support on port[0] = 21 [ 358.837192] cgroup: cgroup2: unknown option "./file0/" [ 358.878859] FAULT_INJECTION: forcing a failure. [ 358.878859] name failslab, interval 1, probability 0, space 0, times 0 [ 358.890127] CPU: 1 PID: 20113 Comm: syz-executor3 Not tainted 4.16.0-rc6+ #41 [ 358.897392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.906725] Call Trace: [ 358.909301] dump_stack+0x194/0x24d [ 358.912912] ? arch_local_irq_restore+0x53/0x53 [ 358.917553] ? trace_hardirqs_off+0x10/0x10 [ 358.921860] should_fail+0x8c0/0xa40 [ 358.925560] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 358.930673] ? __f_unlock_pos+0x19/0x20 [ 358.934647] ? find_held_lock+0x35/0x1d0 [ 358.938728] ? check_same_owner+0x320/0x320 [ 358.943028] ? vfs_write+0x374/0x510 [ 358.946726] ? rcu_note_context_switch+0x710/0x710 [ 358.951639] should_failslab+0xec/0x120 [ 358.955589] kmem_cache_alloc+0x47/0x760 [ 358.959634] getname_flags+0xcb/0x580 [ 358.963412] SyS_mkdir+0xc1/0x2a0 [ 358.966843] ? SyS_mkdirat+0x2b0/0x2b0 [ 358.970715] ? do_syscall_64+0xb7/0x940 [ 358.974669] ? SyS_mkdirat+0x2b0/0x2b0 [ 358.978532] do_syscall_64+0x281/0x940 [ 358.982391] ? __do_page_fault+0xc90/0xc90 [ 358.986598] ? _raw_spin_unlock_irq+0x27/0x70 [ 358.991068] ? finish_task_switch+0x1c1/0x7e0 [ 358.995537] ? syscall_return_slowpath+0x550/0x550 [ 359.000440] ? syscall_return_slowpath+0x2ac/0x550 [ 359.005344] ? prepare_exit_to_usermode+0x350/0x350 [ 359.010341] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 359.015683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.020504] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.025674] RIP: 0033:0x4548b9 2018/03/30 02:11:59 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:11:59 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x72, 0x30dc7ee6, 0x6, 0x0, 0xffffffffffffffff, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x5, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000002100)={r0, &(0x7f0000000100)="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", &(0x7f0000001100)=""/4096}, 0x18) socket$kcm(0x29, 0x5, 0x0) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x13, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) socket$kcm(0x29, 0x7, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002280)={&(0x7f0000002240)='./file0\x00', r0}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0xff, 0x5, 0x7, 0x8, r2, 0xffffffff}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000002140)={0xd, 0x0, 0x200, 0x8, 0x3, r3}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000021c0)={r1, 0x28, &(0x7f0000002180)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000002200)={r4, 0x7fff, 0x18}, 0xc) 2018/03/30 02:11:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceeb", 0x36}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:59 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:59 executing program 1 (fault-call:15 fault-nth:54): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:11:59 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x810) 2018/03/30 02:11:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000080)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r3, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000e00)='./file0/file0\x00', r2}, 0xffffffffffffffdd) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r2}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r5, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r6, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000dc0)={r1, &(0x7f0000000040)="f65db295f915b2333b3863e6143bfb025b0abfaebf34d3ccc9103ae85632c5e24c29", &(0x7f0000000d40)=""/101}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r2, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 359.028837] RSP: 002b:00007fee5d3d0c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 359.036526] RAX: ffffffffffffffda RBX: 00007fee5d3d16d4 RCX: 00000000004548b9 [ 359.043768] RDX: 0000000000000000 RSI: fffffffffffffffe RDI: 0000000020000000 [ 359.051015] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 359.058266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 359.065508] R13: 00000000000003ea R14: 00000000006f7e90 R15: 0000000000000000 2018/03/30 02:11:59 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) [ 359.219264] FAULT_INJECTION: forcing a failure. [ 359.219264] name failslab, interval 1, probability 0, space 0, times 0 [ 359.230558] CPU: 1 PID: 20124 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 359.237820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.247167] Call Trace: [ 359.249753] dump_stack+0x194/0x24d [ 359.253383] ? arch_local_irq_restore+0x53/0x53 [ 359.258050] ? __save_stack_trace+0x7e/0xd0 [ 359.262383] should_fail+0x8c0/0xa40 [ 359.266096] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 359.271186] ? kasan_kmalloc+0xad/0xe0 [ 359.275059] ? kmem_cache_alloc_trace+0x136/0x740 [ 359.279890] ? __memcg_init_list_lru_node+0x169/0x270 [ 359.285064] ? __list_lru_init+0x544/0x750 [ 359.289280] ? sget_userns+0x6b1/0xe40 [ 359.293162] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 359.297904] ? do_mount+0xea4/0x2bb0 [ 359.301605] ? SyS_mount+0xab/0x120 [ 359.305216] ? do_syscall_64+0x281/0x940 [ 359.309260] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.314623] ? find_held_lock+0x35/0x1d0 [ 359.318684] ? __lock_is_held+0xb6/0x140 [ 359.322759] ? check_same_owner+0x320/0x320 [ 359.327076] ? rcu_note_context_switch+0x710/0x710 [ 359.332010] should_failslab+0xec/0x120 [ 359.335975] kmem_cache_alloc_trace+0x4b/0x740 [ 359.340545] ? __kmalloc_node+0x33/0x70 [ 359.344506] ? __kmalloc_node+0x33/0x70 [ 359.348472] ? rcu_read_lock_sched_held+0x108/0x120 [ 359.353485] __memcg_init_list_lru_node+0x169/0x270 [ 359.358495] ? list_lru_add+0x7c0/0x7c0 [ 359.362458] ? __kmalloc_node+0x47/0x70 [ 359.366432] __list_lru_init+0x544/0x750 [ 359.370494] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 359.376372] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 359.381391] ? lockdep_init_map+0x9/0x10 [ 359.385445] sget_userns+0x6b1/0xe40 [ 359.389148] ? set_anon_super+0x20/0x20 [ 359.393120] ? put_filp+0x90/0x90 [ 359.396564] ? destroy_unused_super.part.6+0xd0/0xd0 [ 359.401653] ? alloc_vfsmnt+0x762/0x9c0 [ 359.405611] ? path_lookupat+0x238/0xba0 [ 359.409663] ? mnt_free_id.isra.21+0x50/0x50 [ 359.414065] ? trace_hardirqs_off+0x10/0x10 [ 359.418378] ? putname+0xee/0x130 [ 359.421826] ? cap_capable+0x1b5/0x230 [ 359.425712] ? security_capable+0x8e/0xc0 [ 359.429855] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 359.435030] ? ns_capable_common+0xcf/0x160 [ 359.439343] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 359.444523] mount_ns+0x6d/0x190 [ 359.447888] rpc_mount+0x9e/0xd0 [ 359.451250] mount_fs+0x66/0x2d0 [ 359.454612] vfs_kern_mount.part.26+0xc6/0x4a0 [ 359.459185] ? may_umount+0xa0/0xa0 [ 359.462798] ? _raw_read_unlock+0x22/0x30 [ 359.466933] ? __get_fs_type+0x8a/0xc0 [ 359.470818] do_mount+0xea4/0x2bb0 [ 359.474341] ? __might_fault+0x110/0x1d0 [ 359.478403] ? copy_mount_string+0x40/0x40 [ 359.482624] ? check_same_owner+0x320/0x320 [ 359.486933] ? __check_object_size+0x8b/0x530 [ 359.491430] ? __might_sleep+0x95/0x190 [ 359.495402] ? kasan_check_write+0x14/0x20 [ 359.499622] ? _copy_from_user+0x99/0x110 [ 359.503767] ? memdup_user+0x5e/0x90 [ 359.507466] ? copy_mount_options+0x1f7/0x2e0 [ 359.511957] SyS_mount+0xab/0x120 [ 359.515399] ? copy_mnt_ns+0xb30/0xb30 [ 359.519276] do_syscall_64+0x281/0x940 [ 359.523150] ? __do_page_fault+0xc90/0xc90 [ 359.527373] ? _raw_spin_unlock_irq+0x27/0x70 [ 359.531857] ? finish_task_switch+0x1c1/0x7e0 [ 359.536344] ? syscall_return_slowpath+0x550/0x550 [ 359.541263] ? syscall_return_slowpath+0x2ac/0x550 [ 359.546181] ? prepare_exit_to_usermode+0x350/0x350 [ 359.551191] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 359.556549] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.561389] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.566561] RIP: 0033:0x4548b9 2018/03/30 02:12:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceeb", 0x36}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:00 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:00 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x23, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000e00)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000c80)) mount(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000040)='autofs\x00', 0x1000000000a11800, &(0x7f0000000e40)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000640)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df47c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708e83b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc198bb629", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000d80)) 2018/03/30 02:12:00 executing program 1 (fault-call:15 fault-nth:55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 359.569735] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 359.577427] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 359.584683] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 359.591937] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 359.599190] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 359.606443] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000036 2018/03/30 02:12:00 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x810) 2018/03/30 02:12:00 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:12:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceeb", 0x36}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 360.024258] FAULT_INJECTION: forcing a failure. [ 360.024258] name failslab, interval 1, probability 0, space 0, times 0 [ 360.035583] CPU: 1 PID: 20149 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 360.042843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.052185] Call Trace: [ 360.054765] dump_stack+0x194/0x24d [ 360.058392] ? arch_local_irq_restore+0x53/0x53 [ 360.063056] ? __save_stack_trace+0x7e/0xd0 [ 360.067397] should_fail+0x8c0/0xa40 [ 360.071111] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 360.076201] ? kasan_kmalloc+0xad/0xe0 [ 360.080071] ? kmem_cache_alloc_trace+0x136/0x740 [ 360.084907] ? __memcg_init_list_lru_node+0x169/0x270 [ 360.090093] ? __list_lru_init+0x544/0x750 [ 360.094316] ? sget_userns+0x6b1/0xe40 [ 360.098202] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 360.102946] ? do_mount+0xea4/0x2bb0 [ 360.106647] ? SyS_mount+0xab/0x120 [ 360.110261] ? do_syscall_64+0x281/0x940 [ 360.114306] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.119673] ? find_held_lock+0x35/0x1d0 [ 360.123737] ? __lock_is_held+0xb6/0x140 [ 360.127813] ? check_same_owner+0x320/0x320 [ 360.132129] ? rcu_note_context_switch+0x710/0x710 [ 360.137060] should_failslab+0xec/0x120 [ 360.141033] kmem_cache_alloc_trace+0x4b/0x740 [ 360.145598] ? __kmalloc_node+0x33/0x70 [ 360.149557] ? __kmalloc_node+0x33/0x70 [ 360.153526] ? rcu_read_lock_sched_held+0x108/0x120 [ 360.158535] __memcg_init_list_lru_node+0x169/0x270 [ 360.163535] ? list_lru_add+0x7c0/0x7c0 [ 360.167484] ? __kmalloc_node+0x47/0x70 [ 360.171441] __list_lru_init+0x544/0x750 [ 360.175485] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 360.181350] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 360.186363] ? lockdep_init_map+0x9/0x10 [ 360.190411] sget_userns+0x6b1/0xe40 [ 360.194105] ? set_anon_super+0x20/0x20 [ 360.198078] ? put_filp+0x90/0x90 [ 360.201521] ? destroy_unused_super.part.6+0xd0/0xd0 [ 360.206600] ? alloc_vfsmnt+0x762/0x9c0 [ 360.210547] ? path_lookupat+0x238/0xba0 [ 360.214585] ? mnt_free_id.isra.21+0x50/0x50 [ 360.218978] ? trace_hardirqs_off+0x10/0x10 [ 360.223278] ? putname+0xee/0x130 [ 360.226709] ? cap_capable+0x1b5/0x230 [ 360.230594] ? security_capable+0x8e/0xc0 [ 360.234745] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 360.239922] ? ns_capable_common+0xcf/0x160 [ 360.244224] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 360.249393] mount_ns+0x6d/0x190 [ 360.252761] rpc_mount+0x9e/0xd0 [ 360.256125] mount_fs+0x66/0x2d0 [ 360.259477] vfs_kern_mount.part.26+0xc6/0x4a0 [ 360.264047] ? may_umount+0xa0/0xa0 [ 360.267675] ? _raw_read_unlock+0x22/0x30 [ 360.271803] ? __get_fs_type+0x8a/0xc0 [ 360.275675] do_mount+0xea4/0x2bb0 [ 360.279196] ? __might_fault+0x110/0x1d0 [ 360.283264] ? copy_mount_string+0x40/0x40 [ 360.287483] ? check_same_owner+0x320/0x320 [ 360.291782] ? __check_object_size+0x8b/0x530 [ 360.296276] ? __might_sleep+0x95/0x190 [ 360.300260] ? kasan_check_write+0x14/0x20 [ 360.304477] ? _copy_from_user+0x99/0x110 [ 360.308616] ? memdup_user+0x5e/0x90 [ 360.312317] ? copy_mount_options+0x1f7/0x2e0 [ 360.316807] SyS_mount+0xab/0x120 [ 360.320253] ? copy_mnt_ns+0xb30/0xb30 [ 360.324127] do_syscall_64+0x281/0x940 [ 360.327992] ? __do_page_fault+0xc90/0xc90 [ 360.332206] ? finish_task_switch+0x1c1/0x7e0 [ 360.336695] ? syscall_return_slowpath+0x550/0x550 [ 360.341620] ? syscall_return_slowpath+0x2ac/0x550 [ 360.346535] ? prepare_exit_to_usermode+0x350/0x350 [ 360.351538] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 360.356894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.361740] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.366921] RIP: 0033:0x4548b9 [ 360.370097] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 360.377782] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 360.385032] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 360.392288] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 360.399536] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 360.406788] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000037 [ 360.540621] IPVS: ftp: loaded support on port[0] = 21 [ 360.667696] cgroup: cgroup2: unknown option "./file0/" [ 360.754203] cgroup: cgroup2: unknown option "./file0/" [ 361.527744] IPVS: ftp: loaded support on port[0] = 21 2018/03/30 02:12:02 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x9, 0x2, 0x7, 0x12, 0xffffffffffffffff, 0x7f75c1f}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040), &(0x7f00000000c0)=""/138}, 0x18) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000c00)=0xffffffff, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r1, 0x50, &(0x7f0000000c40)}, 0x10) socketpair(0xa, 0x5, 0x80000001, &(0x7f0000000b80)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000bc0)={0x0, r2, 0x5, 0x1}, 0x14) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000048c0)={&(0x7f0000004740)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000004880)=[{&(0x7f00000047c0)=""/188, 0xbc}], 0x1, 0x0, 0x0, 0xfffffffffffffffa}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000004900)={0x0, 0x8, &(0x7f0000000500)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x1ff}, @generic={0x5, 0xffffffffffffffc0, 0x7, 0x3}, @ldst={0x1, 0x3, 0x0, 0x2, 0x7, 0xfffffff4, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x502595b0}], &(0x7f0000000540)='GPL\x00', 0x4, 0xf3, &(0x7f0000000580)=""/243, 0x40f00, 0x1, [], r3}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0x104, 0x4, 0xca, 0x800000001, 0xffffffffffffffff, 0x0, [0x115]}, 0x2c) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000300)={0xffffffffffffffff}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={r0, &(0x7f00000003c0)="bca629fa", &(0x7f0000000400)=""/179}, 0x18) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r4, 0x50, &(0x7f00000008c0)}, 0x10) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000380)={r6}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r4, 0x50, &(0x7f0000000240)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0x4, &(0x7f0000000980)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x3ad946e1, 0x0, 0x0, 0x0, 0x1f}, @ldst={0x3, 0x2, 0x6, 0x6, 0x7, 0x52, 0xfffffffffffffffc}], &(0x7f00000009c0)='syzkaller\x00', 0x9, 0xea, &(0x7f0000000a00)=""/234, 0x41f00, 0x0, [], r3}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x4, 0x1}, 0x14) recvmsg$kcm(r5, &(0x7f0000000840)={&(0x7f0000000680)=@hci, 0x80, &(0x7f0000000740)=[{&(0x7f0000000700)=""/8, 0x8}], 0x1, &(0x7f0000000780)=""/164, 0xa4, 0x13f}, 0x120) mkdir(&(0x7f0000000880)='./file0\x00', 0x180) 2018/03/30 02:12:02 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000004900)=""/255, 0xff}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:12:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @reserved=0x1}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1ca, &(0x7f00000013c0)=[{0xffffffffffffff72, 0x10c, 0xffffffff, "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"}, {0x0, 0x113, 0x7, "6a8e06f32c3eb5d595d1b42fbe1a3f87609061a5256da7b7143eb86653c9dbb4e768764ccb5b14a3e39666cd93da9e0698321895537ae3eddecb7f0e43e7819714c5be5b2f9a7c8eb2c3f18f31617582b9197c2fb6e99ca310146895dd927d685e82a747fc2541e14cc483ce7c7ea4b9f915dcb42f38b1736973f0b5f6534033621e55414d725b7c42d2fb54ad5ca319e15f0a5925d1cd1d7a0b4603f4f3bb82d592467d90c38c09fb79fef3a9ecf2fef839aa12bebf299b"}, {0x0, 0x10f, 0xba, "458bf4334a3209020b1d95d4d807c0eb0dbb6fc87451a8a336eb641012b825052f036f1a5b347dd6b7ed4a4f97c455df21860b7732257a2145052564aec1e30a312137"}, {0x0, 0x104, 0x0, "b9ec25a853054ab810b5088866b3bbdd0bbda66203680b2e7eb3354d53ab9a146f2580e43059b11dbebc45a8e77b8e598efd879279376f"}], 0xfffffffffffffd7c, 0x20004804}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x0, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 1 (fault-call:15 fault-nth:56): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b", 0x51}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf4608") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 3: mkdir(&(0x7f0000000040)='./file0/', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000080)='iso9660\x00', 0x40020, &(0x7f0000000040)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x50, &(0x7f0000000e40)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffff9c, 0x50, &(0x7f0000000f00)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x50, &(0x7f0000000fc0)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r0, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00'}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000b40)={0xffffffffffffffff}) recvmsg(r2, &(0x7f00000025c0)={&(0x7f0000000b80)=@ipx, 0x80, &(0x7f00000024c0)=[{&(0x7f0000000c00)=""/248, 0xf8}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000d00)=""/224, 0xe0}], 0x3, &(0x7f0000002500)=""/151, 0x97, 0x1ff}, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x41) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='cpuset\x00', 0x10, &(0x7f0000000380)="7bff71eacab2ec1c2ce228b533467bc1644c892ae5cf4701f82220b12d600c600df009011a692aa5a889a906379a756e37de47be6004e0bb1e7ef900a7448c336f6b0eca18188eb861") r3 = socket$kcm(0x29, 0x2, 0x0) recvmsg(r3, &(0x7f0000000a40)={&(0x7f0000000440)=@nl=@proc, 0x80, &(0x7f00000008c0)=[{&(0x7f00000004c0)=""/254, 0xfe}, {&(0x7f00000005c0)=""/201, 0xc9}, {&(0x7f00000006c0)=""/100, 0x64}, {&(0x7f0000000740)=""/175, 0xaf}, {&(0x7f0000000800)=""/159, 0x9f}], 0x5, &(0x7f0000000940)=""/227, 0xe3, 0x9}, 0x2000) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000001c0)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}, 0x2c) close(r4) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000b00)) mount(&(0x7f0000000180)='./file0/', &(0x7f00000001c0)='./file0/', &(0x7f0000000200)='proc\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/', r4}, 0x10) mkdir(&(0x7f0000000000)='./file0/', 0xfffffffffffffffe) r5 = socket$kcm(0x29, 0x7, 0x0) mkdir(&(0x7f0000000a80)='./file0\x00', 0x10) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000002780)={0xb, 0x9, &(0x7f0000002600)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x13}, @jmp={0x5, 0xfffffffffffffffb, 0x3, 0x6, 0x8, 0x30, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x4}], {0x95}}, &(0x7f0000002680)='syzkaller\x00', 0x0, 0x8b, &(0x7f00000026c0)=""/139, 0x41000, 0x1}, 0x48) recvmsg(r5, &(0x7f0000001480)={&(0x7f0000001080)=@alg, 0x80, &(0x7f0000001340)=[{&(0x7f0000001100)=""/239, 0xef}, {&(0x7f0000001200)=""/65, 0x41}, {&(0x7f0000001280)=""/153, 0x99}], 0x3, &(0x7f0000001380)=""/200, 0xc8, 0x2}, 0x103) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000ac0)) sendmsg$kcm(r5, &(0x7f0000000e00)={&(0x7f0000000540)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x2, 0x1, 0x2, 0x2, {0xa, 0x4e21, 0x2, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xfff}}}, 0x80, &(0x7f0000000940)=[{&(0x7f00000005c0)="0c4ea73792bc0800551a3d0d0a74b7b0a31a56598a7bb4b68e9ded35d39dcd0ac838a8ac", 0x24}], 0x1, &(0x7f00000009c0)=ANY=[], 0x0, 0x4004090}, 0x810) 2018/03/30 02:12:02 executing program 5: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x8}, 0xc) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000040)="367cf8cca52a3678987a6148ab80e37d79c9777c3b986e674c0d5edd761cb5ad30fad7d50c9221652fc1eb771b309f8ec15a10ac1f9f84a57dc251531ee8882580fd5a2562ef8ad0b773b289c39d2cc424b5950d7bc8e0a6ce8eed1876602640ccacc804cbb8567a2439f7157ef71b7624f2186ae6395884d192a498379083e593d2f7f382f0939ac1f593cc8497251b89f8a443b16a446b683ae9c6b88c70f06e56202a75e8ac44aea049fdde6e926f9cd362329ad4bc2f1327b95ac2d0c1f7c2c42e91ea797cf49841c8e0b1f3e64e3541c534e2b991b0d9", &(0x7f0000000140)}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x10, 0x7, 0x6, 0x0, 0x8, r0, 0x593}, 0x2c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0xc, 0x2, 0x6, 0x0, r1, 0xd6}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000001dc0)={&(0x7f0000001600)=@sco={0x1f, {0x92d, 0xfa, 0x9, 0x1, 0x5, 0x3}}, 0x80, &(0x7f0000001980)=[{&(0x7f0000001680)="4874f2a221dc3090f6aeb2edf8918ffbfc803b19a3666b7613205290ce7be804603bc8b31d", 0x25}, {&(0x7f0000001700)="13da6396df1a6f79f84903ce59ee1cfeadb278c4f1e0fdbcc20f27fafd11a8ef5ca461a87e8b65b6c6928f8b3bc8b832a7710f236e6a1d07c0654366acfd9898b22a5384a74dc335f77343deab1789f465efdf62d5243a7ba2fa53bd9591eb3be5d63ad3fa77e1ad665f790c3c5e01179f6376b68fe2319f382406c66e89ba53b7ebf40657928ae3f1613ee801803975afbfdecea14550278f320174247c3513e53a68e5ea102f632c53efcc38a5ed12d41ef164a37b309e12eb6eddb94b98dc040c8f64", 0xc4}, {&(0x7f0000001880)="91fe0befe18dfa91936c11b3e908b272ee91524aaf5474c5918fb902a9ea90ac6ae4ef70e63fa3a6eeae6bd641f57f34216d9137c7afdf5a8c5ee18fb84f58414739fb2731f339bd600859a6deb368469d1c1f4aa132961bfc3fd08b3d361186837dadb6ecc6e0c516ef2c935cc5ce0eda9ed29d6ea86ed1fc2200c62e35eb7b408055365e8ecf9c8c782b6be756e18c8a0f4fbed4777ca023c93fba0556e3cdf304a12605eb829a26b9ddfe527677f38016e86173abbf0455d03d5b1d221360c956a31adf6c7b45d03d2d201f09ab22720c0b4c67e848da0f619218fad583bc", 0xe0}], 0x3, &(0x7f0000001a00)=[{0x90, 0x115, 0x9, "b7cf257e01b64badf50cd8c57692616566722cce842d6ad3daddab51049300bb0a16fee0d5f27aefb193f9b1f8421e1cfc5097411fb2ca3f74217ccd2f018533ea3bb1778e92e48d9ff156dc5f3c7ad603c9a6dd6618b54aa97171f65e37317b1521a04320d231eadaeeac396f694263073c760b96a2144feff71111fb4d"}, {0x20, 0x0, 0xfffffffffffffff8, "eca699bd7e457ef111c490e42a"}, {0x110, 0x1ff, 0xfff, "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"}], 0x1c0, 0x80}, 0x40000) r4 = perf_event_open(&(0x7f0000001e40)={0x0, 0x70, 0x5, 0x84, 0x0, 0x3, 0x0, 0xfff, 0x208, 0x0, 0x4, 0x6, 0x3, 0x80, 0xffffffffffffff7f, 0x5, 0x100000001, 0x8001, 0x3, 0x7f, 0x0, 0x10001, 0x7fffffff, 0x0, 0x8000, 0x7, 0x7, 0x3ff, 0x8, 0x100, 0x9, 0x7d, 0x2e8, 0x81, 0xcf1e, 0x10000, 0x1000, 0x7, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000001e00)}, 0x1, 0x9, 0x9, 0x2, 0x0, 0x10001, 0xf9c}, 0x0, 0x1, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x77) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001f00)={0x1, 0x28, &(0x7f0000001ec0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001f40)={r5, 0x6, 0x18}, 0xc) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001fc0)={&(0x7f0000001f80)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002180)={r6, &(0x7f0000002000)="3a36dbc4a4c0e4ef1eb1e696cc23e498fe2ede875bee8da62755c20e74c2faa245b129d27ee35b2bafaa38f1ae60c7228df8db7929dcce1f378084abd59b355db8c13e16c98b9f5dc1a0493f3ea7f75f9aad31279c53d7f79bdd49e8fff68cbbea680710c7815640ca6663565134b41146aadd976da2d092b717df984f260ec2cb2bc16c3b7e595ae9111f51580dffab5bf7e01966c1bf2ef3c1cab7866e2c9d5a278dd3fdef965074a6328035ff3ffe5e0f7722ea983f61c265bb722fae054220159e342019dc85aecb7d9e7d9c7354754919757554c66f41f202bb52af6a880169593d4c9e71be4acbff9d27cba70c0b57997f", &(0x7f0000002100)=""/83}, 0x18) r7 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r7, &(0x7f0000002380)={&(0x7f00000021c0)=@rc, 0x80, &(0x7f0000002300)=[{&(0x7f0000002240)=""/96, 0x60}, {&(0x7f00000022c0)=""/43, 0x2b}], 0x2, &(0x7f0000002340)=""/13, 0xd, 0x10000}, 0x2040) r8 = getpid() perf_event_open(&(0x7f0000002400)={0x0, 0x70, 0x3, 0xca, 0x8, 0x10001, 0x0, 0x0, 0x4402, 0xe, 0xb4, 0x6, 0x5, 0xad, 0x800, 0x3, 0x8, 0x8, 0x1, 0x1ff, 0x4c04, 0x1000, 0x5, 0x80000001, 0x9, 0x401, 0x3, 0x3162e6b3, 0x7f, 0x0, 0x802000, 0x7fffffff, 0x5, 0x8001, 0x7f, 0x1, 0x10000, 0x1f, 0x0, 0x3b, 0x3, @perf_bp={&(0x7f00000023c0)}, 0x200, 0x1ff, 0x9, 0x7, 0x0, 0xfff, 0x15f}, r8, 0x10, r4, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002580)={r6, &(0x7f0000002480)="b999bffba9c79dab2d865b8d9791571279e7f3c7b5755035dde0d4bab2ccfeac3f4d4313675fce2506e7c4c91e8ab994977142b5c1ea5d1d63b84da8ee52061c62b37b18e9674e9d481de6bda01f9b1fa9bbadcbfa35760c825bb954d8d54ad2474984999bcdfaf33b9f0573f9fdbbf0d486aa3a806691590eadca9a3d5543137b53e8efdf50065cc9", &(0x7f0000002540)=""/49}, 0x18) recvmsg$kcm(r7, &(0x7f0000004e00)={&(0x7f00000025c0)=@nl, 0x80, &(0x7f0000004d00)=[{&(0x7f0000002640)=""/209, 0xd1}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000003740)=""/179, 0xb3}, {&(0x7f0000003800)=""/219, 0xdb}, {&(0x7f0000003900)=""/4096, 0x1000}, {&(0x7f0000004a00)=""/232, 0xe8}, {&(0x7f0000004b00)=""/236, 0xec}, {&(0x7f0000004c00)=""/72, 0x48}, {&(0x7f0000004c80)=""/121, 0x79}], 0x9, &(0x7f0000004dc0)=""/28, 0x1c, 0xba}, 0x10000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000004e40)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000004e80)={0x4, 0x3, 0x8000, 0x7fffffff, 0x0, r2, 0x3}, 0x2c) perf_event_open(&(0x7f0000004f00)={0x7, 0x70, 0xff, 0x5, 0x4, 0x0, 0x0, 0x5, 0x2124, 0x1, 0x1f, 0x5, 0x81, 0x16000000000000, 0x3f, 0x8, 0x7, 0x1, 0xffff, 0x9, 0x8, 0x7f90, 0xfffffffffffffff9, 0x9, 0x5, 0x800, 0x8, 0x100, 0x2, 0x1, 0x40, 0x4, 0x200, 0x1, 0x1, 0x0, 0x3, 0x2d, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000004ec0)}, 0x1, 0x3, 0x6, 0x0, 0x5, 0x7, 0x2}, r8, 0x8, r9, 0x2) r10 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004fc0)=0xffffffff, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000005000)={&(0x7f0000004f80)='./file0\x00', r10}, 0x10) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000005040)={0x1f, 0x6, 0x4eebb870, 0x9, 0x2, r6, 0x379e}, 0x2c) socket$kcm(0x29, 0x7, 0x0) r12 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r12, &(0x7f000000b1c0)={&(0x7f0000009f40)=@can={0x0, 0x0}, 0x80, &(0x7f000000b080)=[{&(0x7f0000009fc0)=""/189, 0xbd}, {&(0x7f000000a080)=""/4096, 0x1000}], 0x2, &(0x7f000000b0c0)=""/227, 0xe3, 0x8}, 0x2001) bpf$PROG_LOAD(0x5, &(0x7f000000b200)={0xb, 0x9, &(0x7f0000005080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5}, [@map={0x18, 0xb, 0x1, 0x0, r11}, @jmp={0x5, 0xfffffffffffffff8, 0x1, 0xe, 0x7, 0x4, 0xfffffffffffffffc}, @alu={0x7, 0xffffffffffffff01, 0xf, 0xa, 0xf, 0xffffffff}], {0x95}}, &(0x7f0000005100)='syzkaller\x00', 0xae, 0x1b, &(0x7f0000005140)=""/27, 0x41000, 0x1, [], r13}, 0x48) mount(&(0x7f000000b280)='./file0\x00', &(0x7f000000b2c0)='./file0\x00', &(0x7f000000b300)='cifs\x00', 0x0, &(0x7f000000b340)="88cbfa184a56283e672e1b700bcd3bdebe7e8c7a92d286fb82430a40ad62f4855eccd2243d0272854573813783b6cb86a2b6fc417e35eea4c42f") close(r0) 2018/03/30 02:12:02 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf4608") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2f") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 361.730034] FAULT_INJECTION: forcing a failure. [ 361.730034] name failslab, interval 1, probability 0, space 0, times 0 [ 361.741593] CPU: 0 PID: 20189 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 361.748865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.758204] Call Trace: [ 361.760791] dump_stack+0x194/0x24d [ 361.764432] ? arch_local_irq_restore+0x53/0x53 [ 361.769098] ? find_held_lock+0x35/0x1d0 [ 361.773158] should_fail+0x8c0/0xa40 [ 361.776861] ? __list_lru_init+0x352/0x750 [ 361.781078] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 361.786155] ? trace_hardirqs_off+0x10/0x10 [ 361.790462] ? find_next_zero_bit+0xe3/0x110 [ 361.794848] ? trace_hardirqs_off+0x10/0x10 [ 361.799148] ? find_held_lock+0x35/0x1d0 [ 361.803193] ? __lock_is_held+0xb6/0x140 [ 361.807241] ? check_same_owner+0x320/0x320 [ 361.811543] ? lock_downgrade+0x980/0x980 [ 361.815670] ? rcu_note_context_switch+0x710/0x710 [ 361.820579] ? find_held_lock+0x35/0x1d0 [ 361.824640] should_failslab+0xec/0x120 [ 361.828591] __kmalloc+0x63/0x760 [ 361.832028] ? lock_downgrade+0x980/0x980 [ 361.836160] ? register_shrinker+0x10e/0x2d0 [ 361.840541] ? trace_event_raw_event_module_request+0x320/0x320 [ 361.846577] register_shrinker+0x10e/0x2d0 [ 361.850795] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 361.856587] ? memcpy+0x45/0x50 [ 361.859867] sget_userns+0xbbf/0xe40 [ 361.863568] ? set_anon_super+0x20/0x20 [ 361.867531] ? put_filp+0x90/0x90 [ 361.870959] ? destroy_unused_super.part.6+0xd0/0xd0 [ 361.876042] ? path_lookupat+0x238/0xba0 [ 361.880088] ? mnt_free_id.isra.21+0x50/0x50 [ 361.884478] ? trace_hardirqs_off+0x10/0x10 [ 361.888785] ? putname+0xee/0x130 [ 361.892233] ? cap_capable+0x1b5/0x230 [ 361.896109] ? security_capable+0x8e/0xc0 [ 361.900233] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 361.905398] ? ns_capable_common+0xcf/0x160 [ 361.909711] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 361.914880] mount_ns+0x6d/0x190 [ 361.918234] rpc_mount+0x9e/0xd0 [ 361.921592] mount_fs+0x66/0x2d0 [ 361.924939] vfs_kern_mount.part.26+0xc6/0x4a0 [ 361.929508] ? may_umount+0xa0/0xa0 [ 361.933117] ? _raw_read_unlock+0x22/0x30 [ 361.937247] ? __get_fs_type+0x8a/0xc0 [ 361.941123] do_mount+0xea4/0x2bb0 [ 361.944638] ? __might_fault+0x110/0x1d0 [ 361.948680] ? copy_mount_string+0x40/0x40 [ 361.952886] ? check_same_owner+0x320/0x320 [ 361.957191] ? __check_object_size+0x8b/0x530 [ 361.961668] ? __might_sleep+0x95/0x190 [ 361.965622] ? kasan_check_write+0x14/0x20 [ 361.969832] ? _copy_from_user+0x99/0x110 [ 361.973957] ? memdup_user+0x5e/0x90 [ 361.977642] ? copy_mount_options+0x1f7/0x2e0 [ 361.982114] SyS_mount+0xab/0x120 [ 361.985542] ? copy_mnt_ns+0xb30/0xb30 [ 361.989423] do_syscall_64+0x281/0x940 [ 361.993286] ? __do_page_fault+0xc90/0xc90 [ 361.997492] ? _raw_spin_unlock_irq+0x27/0x70 [ 362.001959] ? finish_task_switch+0x1c1/0x7e0 [ 362.006433] ? syscall_return_slowpath+0x550/0x550 [ 362.011337] ? syscall_return_slowpath+0x2ac/0x550 [ 362.016241] ? prepare_exit_to_usermode+0x350/0x350 [ 362.021239] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 362.026585] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.031425] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.036595] RIP: 0033:0x4548b9 [ 362.039758] RSP: 002b:00007f4d29e0cc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 362.047439] RAX: ffffffffffffffda RBX: 00007f4d29e0d6d4 RCX: 00000000004548b9 [ 362.054683] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 362.061927] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 362.069171] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 02:12:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b", 0x51}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x0, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r4, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000d40)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000040)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="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") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) 2018/03/30 02:12:02 executing program 1 (fault-call:15 fault-nth:57): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='ramfs\x00', 0x4, &(0x7f00000008c0)="08b2335b435d871a80a16b46fda91879c28ae5b6369262795ecf6141fd164c5c3fec170ffe2327fbeacab5bb4b96cff5bc83555d43f89c88d9889a99ef987a149e185993f1f54d13cc7f4c6fcbb62bca97a0cf46082365a8df9eb1cf011aab8ee10774647346453143f802bb614e998c6a") mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r2 = socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r2, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x0, 0x50000000, 0xaa2, 0x613, 0x4, 0x1ff}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2", 0x6c}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0xff, 0x81, 0x100, 0x0, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000005c0)={&(0x7f0000000580)='./file0\x00', r1}, 0x10) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000640)=0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r4, 0x28, &(0x7f00000006c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a80)={r5, 0x100000001, 0x10}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002d00)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000004c0)='vmnet0keyring\x00') socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000cc0)='./file0/file0\x00', &(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1000000000a11800, &(0x7f0000000c00)="47202741310a50362083ae9c5f5cafe96bca57233ea30182e037c1baf739e730336f887a0339aeda9cbfe0a781118feb05032340092c7ef548781bc5ed533c6460773a682f3c83688d9309b573ece2288fabd1b3bda5298371ee2cc65d9c8e1c609983852b62198e9d1c3ae08334b7604279e2791e20acf3ae45ff137f2ca1a54a96db595307e9a8bfc335c20bd320bb024b2ad639e6ad62547e02232ce14daa2fb7") socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000d00)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x40000, &(0x7f0000000f40)="98c88641680d78824ae78486ed248d62cf0048a4f089c5df455f7a3f8c2ec933f6f9a2f2740f2e0f95f0bc6593448131674a41a66f55a89476a734568c514bc1539624bb29c3b28867e5e51278a897910acc3a3f2db229dc2be30450b6f5399c5db093a9e7912ce1bacb01d738ffd82a1eb8a9c3e7e49bd6708c7aa6e865303e4ade304db9ecb792fe506fd24b612827dd38738083743ec5339c457db6ac8c33832062263b90de1c57b4dba60ea318c821f02d12b0eea749a74daf8cd8cf49436775c71c5abcffb8dac7635999fb437aaf898e1e9da8b0cfb9e5790107afdb42e052e962a8aed6f3b735789f91495b69cf69a05ea7216f199b891e099ced3bdba2b509ef6a818d8e1f37a4e4cb0a310e547096c10a3a3707dba75295b40e4730807e57f42dbbffb0cb54919eaefb543e37277cba09d39e6020f20e65a5dab7b9c287676aec124a0e1f472e91a23e66a6d72c346f095e7994a6dc87ee8979cdcc834f2898446b7dbb0ebe0428b04fdc308dc064a8ea2fdd4995e77f9c567cf8a4ff8f0222df7097940174b52ad8e9ef393cc14a2aa6d8cc715d4a52b0a2023f865228a676e0caae5293fd14a7c027a53bd063abf5c326d7057e63e50ae26ae21471be94624b17267ae394dd9ae3c9629bdd87573ceb0bcfa3") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r1, &(0x7f0000000700)="48826af5290ebe80907217132fb0696b0d151c24524054e9d6df43c307218675dd326c647e308f49649d74ce9f1c9c99eca8eb708ef9b6002b9e31f95045541ad4f7c2f6a350ff004bc4015ceb331dc05d82c0306df7d6c5949b0cbc8bacf26d27b262a0d4d4ecad98d3acbc19", &(0x7f00000009c0)=""/161}, 0x18) socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000680)) [ 362.076414] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000038 2018/03/30 02:12:03 executing program 6: socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000400)) socketpair(0x10, 0x804, 0xffffffffffffff01, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x10000) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000140)) r2 = perf_event_open(&(0x7f0000c72000)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xffffffffffeffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6d6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xe9, 0x0, @perf_config_ext, 0x0, 0x800000000000000, 0x100000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x5, 0x40, 0xfffffffffffffffc, 0x8, r0, 0x1}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) recvmsg(r1, &(0x7f0000000300)={&(0x7f0000000180)=@l2, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/130, 0x82}], 0x1, 0x0, 0x0, 0x9}, 0x100) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x4) r4 = getpid() perf_event_open(&(0x7f0000000480)={0x4, 0x70, 0x80000000, 0x20, 0x2, 0x90, 0x0, 0x1, 0x0, 0x0, 0x80, 0x0, 0x3f, 0xfffffffffffffffd, 0x1000, 0x3, 0x1ff, 0x4, 0x7, 0x8, 0x10001, 0x7fff, 0x1, 0x0, 0xbcf, 0x86a, 0x9, 0x3, 0x8, 0x7f1, 0xfffffffffffffff9, 0x7f, 0xffff, 0xfffffffffffffffb, 0x7, 0x5273aa6d, 0x401, 0x7, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000440), 0x8}, 0x0, 0xcee5, 0x1, 0x1, 0x80000000, 0xe, 0x6}, r4, 0x10, r3, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x100000001, 0x1, 0x400, 0x6, 0x0, 0x5, 0x40001, 0x1, 0x7, 0x1f, 0x1, 0xfffffffffffffff8, 0x10001, 0x3, 0x9, 0x1ff, 0x6, 0x9, 0x7, 0xfffffffffffffff8, 0x3, 0x8000, 0xffffffff00000000, 0x0, 0x7f, 0x10001, 0x6, 0x8, 0x3, 0x5, 0xffffffff, 0xef8, 0x5, 0x100000001, 0x3, 0x8, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000000c0), 0x3}, 0x10001, 0x3, 0x0, 0x6, 0x3, 0x200, 0xa7}, r4, 0x0, r1, 0x8) socketpair$inet6(0xa, 0x1, 0x100000000, &(0x7f00000003c0)) socketpair(0x3, 0x7, 0x0, &(0x7f0000000080)) [ 362.481283] ------------[ cut here ]------------ [ 362.486146] refcount_t: increment on 0; use-after-free. [ 362.491633] WARNING: CPU: 0 PID: 4458 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 362.499329] Kernel panic - not syncing: panic_on_warn set ... [ 362.499329] [ 362.506680] CPU: 0 PID: 4458 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #41 [ 362.513851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.523189] Call Trace: [ 362.525767] dump_stack+0x194/0x24d [ 362.529394] ? arch_local_irq_restore+0x53/0x53 [ 362.534060] ? vsnprintf+0x1ed/0x1900 [ 362.537862] panic+0x1e4/0x41c [ 362.541049] ? refcount_error_report+0x214/0x214 [ 362.545796] ? show_regs_print_info+0x18/0x18 [ 362.550293] ? __warn+0x1c1/0x200 [ 362.553741] ? refcount_inc+0x47/0x50 [ 362.557528] __warn+0x1dc/0x200 [ 362.560794] ? refcount_inc+0x47/0x50 [ 362.564587] report_bug+0x1f4/0x2b0 [ 362.568207] fixup_bug.part.11+0x37/0x80 [ 362.572261] do_error_trap+0x2d7/0x3e0 [ 362.576141] ? vprintk_default+0x28/0x30 [ 362.580197] ? math_error+0x400/0x400 [ 362.583987] ? printk+0xaa/0xca [ 362.587257] ? show_regs_print_info+0x18/0x18 [ 362.591753] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.596591] do_invalid_op+0x1b/0x20 [ 362.600288] invalid_op+0x1b/0x40 [ 362.603728] RIP: 0010:refcount_inc+0x47/0x50 [ 362.608116] RSP: 0018:ffff8801b0327860 EFLAGS: 00010286 [ 362.613470] RAX: dffffc0000000008 RBX: ffff8801d80960c4 RCX: ffffffff815ba4be [ 362.620723] RDX: 0000000000000000 RSI: 1ffff10036064ebc RDI: 1ffff10036064e91 [ 362.627975] RBP: ffff8801b0327868 R08: 0000000000000000 R09: 0000000000000000 [ 362.635230] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b0327af8 [ 362.642484] R13: ffff8801bd248013 R14: ffff8801d80960c0 R15: ffff8801bd248001 [ 362.649757] ? vprintk_func+0x5e/0xc0 [ 362.653554] sk_alloc+0x3f9/0x1440 [ 362.657087] ? sock_def_error_report+0x5e0/0x5e0 [ 362.661824] ? __raw_spin_lock_init+0x2d/0x100 [ 362.666403] ? trace_hardirqs_off+0x10/0x10 [ 362.670711] ? do_raw_write_unlock+0x290/0x290 [ 362.675287] ? trace_hardirqs_off+0x10/0x10 [ 362.679590] ? __raw_spin_lock_init+0x1c/0x100 [ 362.684160] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 362.689171] ? find_held_lock+0x35/0x1d0 [ 362.693231] ? inet_create+0x3fc/0xf50 [ 362.697105] ? lock_downgrade+0x980/0x980 [ 362.701247] ? lock_release+0xa40/0xa40 [ 362.705203] ? lock_downgrade+0x980/0x980 [ 362.709369] inet_create+0x47c/0xf50 [ 362.713085] ? ipip_gro_receive+0xf0/0xf0 [ 362.717224] ? __lock_is_held+0xb6/0x140 [ 362.721299] __sock_create+0x4d4/0x850 [ 362.725181] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 362.730111] ? user_path_create+0x40/0x40 [ 362.734261] SyS_socket+0xeb/0x1d0 [ 362.737788] ? fillonedir+0x250/0x250 [ 362.741577] ? move_addr_to_kernel+0x60/0x60 [ 362.745969] ? getname_flags+0x256/0x580 [ 362.750013] ? do_syscall_64+0xb7/0x940 [ 362.753977] ? move_addr_to_kernel+0x60/0x60 [ 362.758378] do_syscall_64+0x281/0x940 [ 362.762248] ? __do_page_fault+0xc90/0xc90 [ 362.766473] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 362.771997] ? syscall_return_slowpath+0x550/0x550 [ 362.776916] ? syscall_return_slowpath+0x2ac/0x550 [ 362.781839] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 362.787196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.792037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.797210] RIP: 0033:0x4573e7 [ 362.800383] RSP: 002b:00007fff21877a18 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 362.808077] RAX: ffffffffffffffda RBX: 0000000000000242 RCX: 00000000004573e7 [ 362.815331] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 362.822587] RBP: 00007fff218780c0 R08: 0000000000000000 R09: 0000000000000001 [ 362.829844] R10: 0000000000000006 R11: 0000000000000202 R12: 0000000000000549 [ 362.837098] R13: 0000000000000549 R14: 000000000000001e R15: 0000000000058490 [ 362.845026] Dumping ftrace buffer: [ 362.848604] (ftrace buffer empty) [ 362.852285] Kernel Offset: disabled [ 362.855883] Rebooting in 86400 seconds..