sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)={0x0, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={r4, 0x0, 0x18}, 0xc) recvmsg$kcm(r2, &(0x7f00000005c0)={&(0x7f0000000000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/52, 0x34}, {&(0x7f0000000380)=""/165, 0xa5}, {&(0x7f00000001c0)=""/93, 0x5d}, {&(0x7f00000004c0)=""/103, 0x67}], 0x4, &(0x7f0000000540)=""/92, 0x5c, 0x63b}, 0x40000000) 2018/03/29 10:20:57 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:57 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000d40)='./file2\x00', 0x12) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000dc0)={&(0x7f0000000d80)='./file2\x00', r0}, 0x10) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x1ffffffffffffe98, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:20:57 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000001080)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f00000010c0)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) r2 = perf_event_open(&(0x7f0000000f40)={0x4, 0x70, 0xfffffffeffffffff, 0x1, 0x5, 0x81, 0x0, 0x8, 0x2042, 0xc, 0x9, 0x10000, 0x200, 0x200, 0x3f, 0x2, 0x7, 0x7, 0x5, 0x10000, 0x5, 0x1000, 0x19a9, 0x5, 0x80000001, 0x24, 0x59, 0xce2, 0x38fc, 0x2, 0x1140cb58, 0x6, 0x400, 0xfffffffffffffff5, 0x5, 0x5, 0x1000, 0x7fff, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000f00), 0x1}, 0x9000, 0xbf5, 0x8, 0x7, 0x100000001, 0xffffffff, 0x9}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000fc0)='\x00') mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000000c0)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000ec0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000003c0)='\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000e80)={0xffffffffffffffff, &(0x7f0000000d40)="05f50ce7b78e7ad73e43355999b1e374b8b084862469b2f2cd5ab851249c150f88e8a24ae20d728d", &(0x7f0000000d80)=""/213}, 0x18) socketpair$inet(0x2, 0x4, 0x0, &(0x7f0000000400)) 2018/03/29 10:20:57 executing program 5: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000003c0)={0xffffffffffffffff}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000000b80)={&(0x7f00000008c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000940)=""/233, 0xe9}], 0x1, &(0x7f0000000a80)=""/203, 0xcb, 0x1}, 0x10120) sendmsg$kcm(r0, &(0x7f0000000dc0)={&(0x7f0000000bc0)=@hci={0x1f, r1, 0x3}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000c40)="a027ff31606c0d7739b0273600e8c299ed05d94c362ecda9a28a61460400a281e5a51fbc3496779623d4a21b4f6f61455c5d5b38dd8dfbe126d3afa586015b52208e30545e714c5762819eed775e941d0ff75c59c145b4b9382cb44466484a7396a3019f23c43304005f46ef36cd33309ee6768bd68aa2c5ff94d68719cb35c5a4747260ca9dd27b5686e10ba1a2cecd67ab049764982fc9d56da865da7e883a28128d59c361feab93c453", 0xab}, {&(0x7f0000003680)="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", 0x1000}, {&(0x7f0000000d00)="79f7b3b407273653bb6416b381129fded5fbd9f39ae0f261bc65a7711174afd11c5276ab53946cf69b718cf1bbb9f3155e4956cd7beca3d9bdee545df045b21f21104301873262118662998b82fa7e4d02563493", 0x54}, {&(0x7f0000004680)="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", 0x1000}], 0x4, &(0x7f0000005680)=ANY=[@ANYBLOB="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"], 0x13b0}, 0x20000011) mkdir(&(0x7f0000000680)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001ac0)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) socketpair$inet6(0xa, 0x1, 0x1603, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000400)='./file0\x00', 0x0, 0xc}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r3}, 0x10) r4 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r4, &(0x7f00000001c0)={&(0x7f0000001c00)=@nfc_llcp, 0x80, &(0x7f0000003000)=[{&(0x7f0000001c80)=""/68, 0x44}, {&(0x7f0000001d00)=""/173, 0xad}, {&(0x7f0000001dc0)=""/56, 0x23}, {&(0x7f0000001e00)=""/4096, 0x1114}, {&(0x7f0000002e00)=""/34, 0x22}, {&(0x7f0000002e40)=""/174, 0xae}, {&(0x7f0000002f00)=""/219, 0xfffffffffffffd29}], 0x7, &(0x7f0000003080)=""/249, 0xf9, 0x7}, 0x8000000000001) sendmsg$kcm(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="8f370d1c8911dc03957273988df9678a95df93968a74212bd62b5b7173e5386a0ba7b46e3ed1038edd4208257593e0e9fe08b19c75385dfccada1316e6c9687debbb352e5b706e1f496b8a16cd2bb20d43ae00433cc508c7dd4ead709b0a9b0033bb1584bd74d056c43ff74463139bb4d19054b8cc3d113ecdca84680eb0c22c0767df08f0743a96d640cd96bd95b8edb58d879202713f8c5ca87bfaf73e85e37937b20c0b048b38ef5e72", 0xab}, {&(0x7f00000004c0)="5659a7825dcd27bde42458b001d862f0e5", 0x11}], 0x2, &(0x7f00000016c0)}, 0x880) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000380)) sendmsg$kcm(r0, &(0x7f0000000540)={&(0x7f0000000440)=@nfc={0x27, 0x1, 0x1, 0x2}, 0x80, &(0x7f0000000040)=[{&(0x7f00000006c0)="1369199c3e9ea49a577668eb28b6a9e7fd836e30cf67541cba18f148bbc4c86642bdf0fa166e85489ca04c4722bbf018f216e3ce3f1dbd15889ff712e3c7f4285f1be583a5cf5c1ea177c71cdec306f335", 0x51}], 0x1, &(0x7f0000000740)=[{0x68, 0x19f, 0x6, "80f2c1f7ec73b78c089cd991bb0d047b466aa67885f3f70a4c60187cd15f0400b8f1b710be7ab1be2b22448fd8c7f1398548241be43b84d93076e5f6e5d4340c6249e42c6cbe0d7a078026c2e8d7343715f6"}, {0xd0, 0x10c, 0x8000, "f03f3c3950a565c10a2b208cc2b03ddb239a5ff84d36b3bda58ddb22a0d37b39c7f9d8e7228bd954c54257c5a6e99b3636b12e61ff56ec23ff4d04fbbd91d8f2267b578e4e18dad7440850bea4a0fb013182add46908e011c7599606b16fd2e067b972564161353a747b65f1facd32f7528fb9e8885cdb001abdd3094fba335ab823c0bbea176c4b1cf5738c1e90772cd8b9cc837bef1fe8bfe715459a0673af4dd6cac14d50b5c75750d7835c697db457ef21194d2201f23a82cfc527"}], 0x138, 0x8080}, 0x40000) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r2, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000003440)="86672d77769131ed2ce8a0bb7122fb431e6fbe0014f3fbd7e30fe4ab43b9c9f1ad4af6fab9d1666ecf62c1ee992664e6b83757afff528a29ffcc0cec90c89158640c831402f614ea5868b9dcfea829f5ff1f8684cfe4d3abd8d28960eba64bbc24611555015f3c574ec9d194ad10f0d69eade14d1ed5d64d37495fab90ba2b61290279212e2becccf1203a4ef7173e71b03301bac6f51c2d8267be155ff7bfc918b403c7b42ceb0d38f6db95bb2da770b0c9d03354ae23c6e9a55f0494d3b8432550e5726eace50391", 0xc9}], 0x1}, 0x2000c054) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001bc0)={&(0x7f0000001b00)='./file0\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003380)={r2, 0x0, 0x91, 0xe7, &(0x7f00000031c0)="fa79ef3a923425b880c4eb867ee79c407816a2a5f3261e2fb23abe34625551ad3be0b348a59992b9a917a5383ccdda264e65fbbce8f0e91dd7d86f21bde99d3653f07bfd88b5cfc183c8056ecca72c49f6703856f1a9f31fba0a2f286c62b12f4f5c62fe8b3959784eb7fcc12b17786c001b340a7ec4152ad0f47d5e1295e9b7df1b404426ab9282630d5012b6d3d16800", &(0x7f0000003280)=""/231, 0x1000, 0x800}, 0x28) recvmsg(r3, &(0x7f0000001a40)={&(0x7f00000005c0)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f0000001800)=""/235, 0xeb}, {&(0x7f0000001900)=""/238, 0xee}, {&(0x7f0000000340)=""/16, 0x10}], 0x3, &(0x7f0000001a00)=""/15, 0xf, 0x400}, 0x40) [ 251.193222] hugetlbfs: Bad mount option: "@" 2018/03/29 10:20:57 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:57 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x7f, 0xffffffffffffffff, 0x7, 0x70, 0x0, 0xfc3, 0x10200, 0x2, 0x100000001, 0xff, 0xdf7, 0xf48f, 0x75ce, 0x80000000, 0x9, 0x5, 0x0, 0x3, 0xa589, 0x800, 0x2, 0x2aa0, 0x7, 0xfe3f, 0x9, 0x400000000, 0xff, 0x1, 0x3f, 0xfffffffffffffe04, 0x2, 0x1, 0xe5, 0x3, 0x1, 0x8, 0x0, 0x7, 0x0, @perf_config_ext={0x1e6caf75, 0x7}, 0x8, 0x8, 0x7abbde3f, 0x1, 0x8, 0x0, 0x80000000}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0xffffffff7fffffff) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:20:57 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:57 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:57 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r2, &(0x7f00000004c0)="0e70ac4e25c16b6a1f9ed95c3b4c5bf5b22df90c8735ccb0d70095225a9d5ddca8893583fb143c15cca1215a0a6966ef50a5452a6cc340fbe9422d18663898c82cb5552e9a9e71f71a6b37e976ed83449a88b0a62e69b83a13957b99214e730b5c2b5a1fdbd37954645c508a4d4fd9ad6f3c4b1bba611befe0e6f5f8ffc135a21456cabf82db4214f3766c5b66908ebeb041484e23fa308448d56ba211848b746234a91af072413f4e268746f2911cbf1628be4d92fb31b7c1535a124492a718a2d060853c4cbbd1b841314f71bad1298c2aa7b8c213ff0a79d181d784e1334a9af8d2437792", &(0x7f0000000000)="04821ed48c8f14519613f1919e3d622d0f582eeeca07a867e96687a6392ececf9cd5c079361876587dbb1ac17a6412a97e029f758772baccea52f68c0c889135fa53ef4b1fe3b93cd9", 0x3}, 0x20) r3 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x9, 0x51, 0x8, 0x7ff, 0x0, 0x7fffffff, 0x2410, 0x4, 0x2, 0x5, 0x23c, 0x6, 0xff, 0x4, 0x8001, 0x5, 0xff, 0x8, 0x5, 0x0, 0x10000, 0x8001, 0x0, 0x6, 0x8, 0x8, 0x6, 0x3fe4, 0x1, 0x3, 0x0, 0xf7a4, 0x2, 0xfff, 0x4, 0x401, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0x102, 0x3f, 0x80000000, 0x6, 0xffff, 0x80000000, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000200)={0x1, 0x0, [0x0]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xfffffffd, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:20:57 executing program 5: mkdir(&(0x7f0000000680)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001ac0)={&(0x7f0000001a80)='./file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000df7000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x200, &(0x7f00000001c0)) socketpair$inet6(0xa, 0x1, 0x1603, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) r2 = socket$kcm(0x29, 0x7, 0x0) recvmsg$kcm(r2, &(0x7f0000003180)={&(0x7f0000001c00)=@nfc_llcp, 0x80, &(0x7f0000003000)=[{&(0x7f0000001c80)=""/68, 0x44}, {&(0x7f0000001d00)=""/173, 0xad}, {&(0x7f0000001dc0)=""/56, 0x38}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000002e00)=""/34, 0x22}, {&(0x7f0000002e40)=""/174, 0xae}, {&(0x7f0000002f00)=""/219, 0xdb}], 0x7, &(0x7f0000003080)=""/249, 0xf9, 0x7}, 0x0) sendmsg$kcm(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)="8f370d1c8911dc03957273988df9678a95df93968a74212bd62b5b7173e5386a0ba7b46e3ed1038edd4208257593e0e9fe08b19c75385dfccada1316e6c9687debbb352e5b706e1f496b8a16cd2bb20d43ae00433cc508c7dd4ead709b0a9b0033bb1584bd74d056c43ff74463139bb4d19054b8cc3d113ecdca84680eb0c22c0767df08f0743a96d640cd96bd95b8edb58d879202713f8c5ca87bfaf73e85e37937b20c0b048b38ef5e72", 0xab}, {&(0x7f00000004c0)="5659a7825dcd27bde42458b001d862f0e5", 0x11}], 0x2, &(0x7f00000016c0)}, 0x880) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001b80)={&(0x7f0000001b40)='./file0\x00', 0x0, 0x10}, 0x10) sendmsg(r0, &(0x7f0000003640)={0x0, 0x0, &(0x7f0000003600)=[{&(0x7f0000003440)="86672d77769131ed2ce8a0bb7122fb431e6fbe0014f3fbd7e30fe4ab43b9c9f1ad4af6fab9d1666ecf62c1ee992664e6b83757afff528a29ffcc0cec90c89158640c831402f614ea5868b9dcfea829f5ff1f8684cfe4d3abd8d28960eba64bbc24611555015f3c574ec9d194ad10f0d69eade14d1ed5d64d37495fab90ba2b61290279212e2becccf1203a4ef7173e71b03301bac6f51c2d8267be155ff7bfc918b403c7b42ceb0d38f6db95bb2da770b0c9d03354ae23c6e9a55f0494d3b8432550e5726eace50391", 0xc9}], 0x1}, 0x2000c054) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='proc\x00', 0x0, &(0x7f00000002c0)="ee935b9ef9b39e4da32f") bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001bc0)={&(0x7f0000001b00)='./file0\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000003380)={r0, 0x0, 0x91, 0xe7, &(0x7f00000031c0)="fa79ef3a923425b880c4eb867ee79c407816a2a5f3261e2fb23abe34625551ad3be0b348a59992b9a917a5383ccdda264e65fbbce8f0e91dd7d86f21bde99d3653f07bfd88b5cfc183c8056ecca72c49f6703856f1a9f31fba0a2f286c62b12f4f5c62fe8b3959784eb7fcc12b17786c001b340a7ec4152ad0f47d5e1295e9b7df1b404426ab9282630d5012b6d3d16800", &(0x7f0000003280)=""/231, 0x1000, 0x800}, 0x28) recvmsg(r1, &(0x7f0000001a40)={&(0x7f00000005c0)=@nfc, 0x80, &(0x7f0000000640)=[{&(0x7f0000001800)=""/235, 0xeb}, {&(0x7f0000001900)=""/238, 0xee}, {&(0x7f0000000340)=""/16, 0x10}], 0x3, &(0x7f0000001a00)=""/15, 0xf, 0x400}, 0x40) 2018/03/29 10:20:57 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:57 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) r2 = perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x9, 0x5, 0x2, 0x4, 0x0, 0x7, 0x20050, 0xe, 0x9, 0x3, 0x8001, 0x0, 0x80, 0x8, 0x8c, 0x1, 0x8001, 0x200, 0x15, 0x20, 0x3308000000000000, 0x7, 0xdada, 0x10001, 0x8, 0x7ff, 0x3, 0x0, 0x9, 0x10001, 0x9, 0x2, 0x1, 0x7, 0x400, 0xffffffff, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x2, 0x80, 0x4, 0x7, 0x5, 0x2, 0xff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r3, &(0x7f00000001c0)="f27f135bcf091fa3e5cdffb55e538a8835a6", &(0x7f0000000200)=""/18}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) socketpair$unix(0x1, 0x5e56379ef3e33048, 0x0, &(0x7f0000000140)) 2018/03/29 10:20:57 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x400000000000001}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r1, 0x50, &(0x7f0000000d40)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000f00)=r3, 0x4) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x9, 0xd, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6968, 0x0, 0x0, 0x0, 0x1}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @generic={0x1b, 0x0, 0x1, 0x400000000000000}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1fffffffc, 0x0, 0x0, 0x0, 0xf3f}, @generic={0x8, 0x496cbe0f, 0x7470, 0x9}, @initr0={0x18, 0x0, 0x0, 0x0, 0x56000000000000, 0x0, 0x0, 0x0, 0x800}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x1, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00') ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000100)=0x6) [ 251.420426] hugetlbfs: Bad mount option: "./file0" 2018/03/29 10:20:57 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x18, 0x3, 0x4, &(0x7f00000003c0)) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) sendmsg$kcm(r2, &(0x7f0000000380)={&(0x7f0000000000)=@sco={0x1f, {0x3f, 0x100000000, 0x3, 0x400, 0x8, 0x3f}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)="8d39d24e3c06dff56571eebdd514ade3dcc46cdac7cb03f2a701d4c7b371f461d2ea7f151076b2975b64a7b7147986c1ac87eaaae0e7e5f5d025204b82cde7e31e1a37c76e62f7f23067435064d00e7f1edd22e34c0752f6bebbbca503a4cd", 0x5f}, {&(0x7f0000000080)="2a9a9fa9", 0x4}, {&(0x7f00000004c0)="7bdc464a37a8b862825156be52d68f46b56e5c7bec0b7b8d6c433b3ab06652ce41c1fb97c79f05651b6dfb0d45f646ffce985ff4d7834c88e9eda0d92d853736d265218d417caf040810a8c9d77f7283813fd42120dd2d1b2dcadddbf26dea84d91eebac45a8cdb7f49c30b678b040260870037651efb723e18ff2b68912087882b62b6320b0d7797ca64f196d3d997207d8a8e77d6b66756c0365490186e19f5e19720dbda9ad0cc1f0dbb06de9e48082326b06d24f81585c440fc7c1d763e79f11acad5e631783b6345840d83c34a236da27421d570b268a8eb2", 0xdb}], 0x3, &(0x7f0000002280)=ANY=[@ANYBLOB="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"], 0x1050, 0x2004c095}, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:20:57 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:57 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:57 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x400000000005, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socket$kcm(0x29, 0x7, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:20:57 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:57 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) 2018/03/29 10:20:57 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:57 executing program 2 (fault-call:1 fault-nth:0): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) [ 251.670514] FAULT_INJECTION: forcing a failure. [ 251.670514] name failslab, interval 1, probability 0, space 0, times 0 [ 251.681796] CPU: 1 PID: 4370 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 251.688979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 251.698327] Call Trace: [ 251.700899] dump_stack+0x194/0x24d [ 251.704511] ? arch_local_irq_restore+0x53/0x53 [ 251.709192] should_fail+0x8c0/0xa40 [ 251.712888] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 251.717972] ? lock_downgrade+0x980/0x980 [ 251.722101] ? get_pid_task+0xbc/0x140 [ 251.725971] ? proc_fail_nth_write+0x9b/0x1d0 [ 251.730446] ? map_files_get_link+0x3a0/0x3a0 [ 251.734994] ? find_held_lock+0x35/0x1d0 [ 251.739063] ? check_same_owner+0x320/0x320 [ 251.743369] ? rcu_note_context_switch+0x710/0x710 [ 251.748286] should_failslab+0xec/0x120 [ 251.752239] __kmalloc_track_caller+0x5f/0x760 [ 251.756804] ? strncpy_from_user+0x430/0x430 [ 251.761189] ? strndup_user+0x62/0xb0 [ 251.764973] memdup_user+0x2c/0x90 [ 251.768492] strndup_user+0x62/0xb0 [ 251.772194] SyS_mount+0x3c/0x120 [ 251.775622] ? copy_mnt_ns+0xb30/0xb30 [ 251.779490] do_syscall_64+0x281/0x940 [ 251.783354] ? __do_page_fault+0xc90/0xc90 [ 251.787564] ? _raw_spin_unlock_irq+0x27/0x70 [ 251.792043] ? finish_task_switch+0x1c1/0x7e0 [ 251.796528] ? syscall_return_slowpath+0x550/0x550 [ 251.801444] ? syscall_return_slowpath+0x2ac/0x550 [ 251.806350] ? prepare_exit_to_usermode+0x350/0x350 [ 251.811345] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 251.816691] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 251.821519] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 251.826686] RIP: 0033:0x4548b9 [ 251.829861] RSP: 002b:00007f09c9a11c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 251.837565] RAX: ffffffffffffffda RBX: 00007f09c9a126d4 RCX: 00000000004548b9 [ 251.844814] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 251.852061] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 251.859308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/03/29 10:20:58 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair$inet6(0xa, 0x0, 0x9b1, &(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f00000004c0)=[{0xd0, 0x117, 0x7, "788db4e024e0c942db06ce72fa4fb1dfb8e1a5ce27d15da7598c1cae1db3a1dd23f9f78e70633e14838c41410a9e26c2d49da099f455953dba587fca31435c0378f49f1290887f51213a452915e051e307c46933d271745c2e5b571e54358415cf17bfc30ebdbdbffcd93feb0d359ef18355bf52d2fd514e86eb3073b52a0cca7b396e681929a0bea6a4065d9cd94017095ed616390fd053334f8180c6ed7503c76b2863d049624df5ff98aafbc8b8e4a20b25650bd6b73408e6bc7e415dc7f0"}], 0xd0}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:20:58 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 251.866553] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 2018/03/29 10:20:58 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) socketpair(0x1, 0x80003, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 253.083361] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 10:20:59 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffff9c, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e00)={r2, 0x1, 0x10}, 0xc) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2000000000000186, &(0x7f0000000dc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, [@ldst={0x2, 0x1, 0x0, 0x6, 0x0, 0x2fc376f091afb730, 0x8}], {0x95}}, &(0x7f0000000180)='GPL\x00', 0x6f, 0x67, &(0x7f0000000d40)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:20:59 executing program 2 (fault-call:1 fault-nth:1): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:20:59 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:59 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000000000)="fbb73eeae481c0da378f4c9a6811d45dcf92905f847e2ae3da049a63a3e7f25bf074ed72ea4263f4728a89a3624f702e9562ade0f86b6a148ca4e30b68392fb5bfbaae5ee9b85a29c49a22a969d51db1b59013431b40527b390aba052a09e34c06f17cf2fcb7a2a5bb65f22da149ebb13c64744438b19379bc4f78642b457e453fcb45e3fb234f9e0b0b3dfc31e9e7f38d7f06ea8933649bc4de843723a8ae082004d1d93685d4", 0xa7}, {&(0x7f00000001c0)="773e082b8417c7737c8115c2da3fda8053163b3e0ee6323bcee2fb17a709e1628408cbcc9a82496f4684368aba293853128bac75e4d96870ef7592441afa1d44a07b9a2903f6e1", 0x47}, {&(0x7f0000000380)="5fd6523af0cc11ca126cc733825a9b050757c122b6de6e43f31da889643d4463fe381a406955e2438b93f445342fef6511fb6b54439a51133f594ac8247de4ed004c53fd0c7b3c6f150681cfd262f7c4da47ae047bd9e3f4e7d04c673467ded392f206b583dbb778e0af01f3139b52dd70a251a7a40cd1ec47d3cd29a04b0ee926fc312057845091b66f2a38d8d397820d6412173707c6f0daa30bbfb0994ca41f1d3e26a8cf", 0xa6}, {&(0x7f0000000140)="01bbfad0648390da0de08d26023292a69c8e8c7e1a43bd15aface9717e590cf9", 0x20}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f00000004c0)="aa75abce04057d530f0c3319ee0a1bb63f6f00b29194f747f7522f077db4f41bccd4af3e992ad5818b2d05a8de4c6dd0d1e7fd43f2837daef1575362212ea5bb2895ccd1a39cdbbdfbf57b809196add79605d48ad932336f21b3d2605691cf11dedec912edde7304fc79f3f95028b52cc480a2b8d58a49b5c93920fba2e65147cef2460716f110271945c0309c47c4b72c2c9a8196b6b5b3d66a916932f14fd6f00e729b799168e5dd0308b2e6433d98dcf0b31b49626b00545994aa1fb98b17401f9895c5cadcf13ed46cb57f95464f1f7aad26abe7eb71c2e2", 0xda}, {&(0x7f00000005c0)="97a2d1e47e54b66c897b21b2591f51e7f591f6d01260b0951512415efe95baeca8501158d67acc38c5950d772ebd8a26b03bfdaa56034e8c778ac9237d072185689dc98d94b8440796b06f572b48b85599508b03ec127c945eedd8dde0731765b80d8369ee488f152d48ad13e37c01feb646cda37e1801d5b3ecbfa6770dd408e0e7a9ea1b1bbff786da537b3c71", 0xff5c}], 0x8, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:20:59 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:59 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:59 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:59 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x5, 0x3, 0x708, 0x8001, 0x0, 0x2, 0x40000, 0x2, 0x800, 0x9, 0x8, 0x0, 0x10000, 0x3, 0x7, 0x8000, 0x1, 0x1f, 0x3ff, 0x3, 0x8001, 0x55, 0x100000000, 0xfffffffffffffff7, 0xc1be, 0x8000, 0x4, 0x8, 0xd016, 0x178f6337, 0x9, 0x5, 0x0, 0x0, 0xffffffff, 0xbab, 0x0, 0x4, 0x3, @perf_bp={&(0x7f0000000140), 0x5}, 0x8001, 0x10000, 0x200, 0x5, 0x6, 0x1, 0x80}, 0x0, 0xe, 0xffffffffffffffff, 0x2) close(r2) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100000001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x28, &(0x7f0000000380)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={r4, 0x100000000}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x1e, 0x101, 0x3, 0x40, 0x0, 0x10, 0x80000, 0x1, 0x6, 0x6, 0x6, 0x1000, 0x5, 0x9, 0x0, 0x7f, 0x5, 0x7f, 0x3, 0x1f, 0xff, 0x1, 0x4, 0x2d1e, 0x80000001, 0x5, 0x2, 0x0, 0x1, 0xc14, 0x7ff, 0x4, 0x2, 0x8fbd, 0x0, 0x5, 0x0, 0x2bb, 0x5, @perf_config_ext={0x7, 0xda4}, 0x200, 0x4, 0xffffffffffffff9e, 0x5, 0x4, 0xff, 0x6}, 0x0, 0xa, r1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000080)='em0eth1vmnet1\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) [ 253.190209] FAULT_INJECTION: forcing a failure. [ 253.190209] name failslab, interval 1, probability 0, space 0, times 0 [ 253.201564] CPU: 1 PID: 4429 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 253.208753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.218101] Call Trace: [ 253.220684] dump_stack+0x194/0x24d [ 253.224305] ? arch_local_irq_restore+0x53/0x53 [ 253.228956] ? __save_stack_trace+0x7e/0xd0 [ 253.233281] should_fail+0x8c0/0xa40 [ 253.237006] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.242108] ? kasan_kmalloc+0xad/0xe0 [ 253.245973] ? __kmalloc_track_caller+0x15e/0x760 [ 253.250802] ? memdup_user+0x2c/0x90 [ 253.254503] ? strndup_user+0x62/0xb0 [ 253.258284] ? SyS_mount+0x3c/0x120 [ 253.261898] ? proc_fail_nth_write+0x9b/0x1d0 [ 253.266376] ? map_files_get_link+0x3a0/0x3a0 [ 253.270863] ? find_held_lock+0x35/0x1d0 [ 253.274954] ? check_same_owner+0x320/0x320 [ 253.279265] ? rcu_note_context_switch+0x710/0x710 [ 253.284176] ? __check_object_size+0x8b/0x530 [ 253.288667] should_failslab+0xec/0x120 [ 253.292626] __kmalloc_track_caller+0x5f/0x760 [ 253.297197] ? strncpy_from_user+0x430/0x430 [ 253.301586] ? strndup_user+0x62/0xb0 [ 253.305370] ? _copy_from_user+0x99/0x110 [ 253.309509] memdup_user+0x2c/0x90 [ 253.313040] strndup_user+0x62/0xb0 [ 253.316655] SyS_mount+0x6b/0x120 [ 253.320088] ? copy_mnt_ns+0xb30/0xb30 [ 253.323965] do_syscall_64+0x281/0x940 [ 253.327838] ? __do_page_fault+0xc90/0xc90 [ 253.332053] ? _raw_spin_unlock_irq+0x27/0x70 [ 253.336530] ? finish_task_switch+0x1c1/0x7e0 [ 253.341013] ? syscall_return_slowpath+0x550/0x550 [ 253.345942] ? syscall_return_slowpath+0x2ac/0x550 [ 253.350853] ? prepare_exit_to_usermode+0x350/0x350 [ 253.355851] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 253.361213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.366052] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 253.371219] RIP: 0033:0x4548b9 [ 253.374387] RSP: 002b:00007f09c9a11c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 253.382078] RAX: ffffffffffffffda RBX: 00007f09c9a126d4 RCX: 00000000004548b9 [ 253.389327] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 253.396579] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 253.403830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 253.411084] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 2018/03/29 10:20:59 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:59 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xc, 0x7, 0x9e6a, 0x7e9, 0x10, 0xffffffffffffffff, 0x8}, 0x2c) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:20:59 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0xd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x100}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0xf3, &(0x7f00000001c0), &(0x7f0000000280)=""/243, 0x0, 0x8}, 0x28) mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x20) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000540)) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000700)={r2, &(0x7f00000007c0)="286b0fddcf3e5efe35e1526fb021eb87dff9bc5d20781829e605db3140ceb3aa27c213fc9de95a1bcd518c7e224bce6c786e95e8febb46d88d1567c87974", &(0x7f0000000740)=""/102}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x9, &(0x7f0000000640)=ANY=[@ANYBLOB="180000000000000000665a9ee97e477cfd680000000800fe01800080000000000000000000000085000000310000000000000000000000002a3bb9f20000006583f15876123c4a7c6f186647d944dc67fb53ea7da649d91ad15d6d3869da0d0f9dbda778577733761e9864a7901399f55c6098abf728b3ff5ec2fcdf18729d7b99fcee0ca971cb8443b456d43c979cb111ece5ec63642ab95b72"], &(0x7f0000000380)='syzkaller\x00', 0x341, 0xb, &(0x7f00000003c0)=""/11, 0x41000, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000400)={&(0x7f0000000140)='./file0\x00', r5}, 0x10) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:20:59 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:59 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000003c0)={r2, r1}) recvmsg$kcm(r3, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:20:59 executing program 2 (fault-call:1 fault-nth:2): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:20:59 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:20:59 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:20:59 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 253.618881] FAULT_INJECTION: forcing a failure. [ 253.618881] name failslab, interval 1, probability 0, space 0, times 0 [ 253.630271] CPU: 1 PID: 4478 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 253.637462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.646812] Call Trace: [ 253.649391] dump_stack+0x194/0x24d [ 253.653013] ? arch_local_irq_restore+0x53/0x53 [ 253.657692] should_fail+0x8c0/0xa40 [ 253.661396] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 253.666479] ? __kmalloc_track_caller+0x15e/0x760 [ 253.671302] ? strndup_user+0x62/0xb0 [ 253.675082] ? SyS_mount+0x6b/0x120 [ 253.678694] ? trace_hardirqs_off+0x10/0x10 [ 253.682995] ? proc_fail_nth_write+0x9b/0x1d0 [ 253.687480] ? map_files_get_link+0x3a0/0x3a0 [ 253.691975] ? find_held_lock+0x35/0x1d0 [ 253.696073] ? check_same_owner+0x320/0x320 [ 253.700371] ? lock_release+0xa40/0xa40 [ 253.704322] ? check_same_owner+0x320/0x320 [ 253.708627] ? rcu_note_context_switch+0x710/0x710 [ 253.713556] should_failslab+0xec/0x120 [ 253.717513] kmem_cache_alloc_trace+0x4b/0x740 [ 253.722083] ? kasan_check_write+0x14/0x20 [ 253.726296] ? _copy_from_user+0x99/0x110 [ 253.730437] copy_mount_options+0x5f/0x2e0 [ 253.734666] SyS_mount+0x87/0x120 [ 253.738101] ? copy_mnt_ns+0xb30/0xb30 [ 253.741975] do_syscall_64+0x281/0x940 [ 253.745840] ? __do_page_fault+0xc90/0xc90 [ 253.750051] ? _raw_spin_unlock_irq+0x27/0x70 [ 253.754527] ? finish_task_switch+0x1c1/0x7e0 [ 253.759008] ? syscall_return_slowpath+0x550/0x550 [ 253.763926] ? syscall_return_slowpath+0x2ac/0x550 [ 253.768842] ? prepare_exit_to_usermode+0x350/0x350 [ 253.773842] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 253.779198] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 253.784044] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 253.789215] RIP: 0033:0x4548b9 [ 253.792382] RSP: 002b:00007f09c9a11c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 253.800070] RAX: ffffffffffffffda RBX: 00007f09c9a126d4 RCX: 00000000004548b9 [ 253.807317] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 2018/03/29 10:20:59 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 253.814568] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 253.821820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 253.829066] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 2018/03/29 10:21:00 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x9, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}, [@exit={0x95}, @exit={0x95}, @exit={0x95}], {0x95}}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x89, &(0x7f0000000380)=""/137, 0x41100, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x1b1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0xac1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 2 (fault-call:1 fault-nth:3): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:00 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={0x0, r1, 0x2, 0x3}, 0x14) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f00000003c0)=0x9, 0x4) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:00 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f00000004c0)="98528f5089c560ff21fb352c37e893003f92e61bdd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329953dc5ac6be8519811010f61b8bc9225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162", &(0x7f0000000300)=""/39}, 0x119) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) socketpair(0xb, 0x8000f, 0x7, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80000001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:00 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 253.954994] FAULT_INJECTION: forcing a failure. [ 253.954994] name failslab, interval 1, probability 0, space 0, times 0 [ 253.966309] CPU: 1 PID: 4511 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 253.973495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.982843] Call Trace: [ 253.985414] dump_stack+0x194/0x24d [ 253.989029] ? arch_local_irq_restore+0x53/0x53 [ 253.993692] should_fail+0x8c0/0xa40 [ 253.997388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 254.002475] ? lock_release+0xa40/0xa40 [ 254.006444] ? find_held_lock+0x35/0x1d0 [ 254.010513] ? check_same_owner+0x320/0x320 [ 254.014819] ? rcu_note_context_switch+0x710/0x710 [ 254.019737] should_failslab+0xec/0x120 [ 254.023688] kmem_cache_alloc+0x47/0x760 [ 254.027732] ? map_files_get_link+0x3a0/0x3a0 [ 254.032217] getname_flags+0xcb/0x580 [ 254.036048] user_path_at_empty+0x2d/0x50 [ 254.040178] do_mount+0x15f/0x2bb0 [ 254.043706] ? copy_mount_string+0x40/0x40 [ 254.047917] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 254.052922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.057665] ? retint_kernel+0x10/0x10 [ 254.061542] ? copy_mount_options+0x149/0x2e0 [ 254.066024] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 254.070848] ? copy_mount_options+0x1f7/0x2e0 [ 254.075328] SyS_mount+0xab/0x120 [ 254.078756] ? copy_mnt_ns+0xb30/0xb30 [ 254.082640] do_syscall_64+0x281/0x940 [ 254.086504] ? __do_page_fault+0xc90/0xc90 [ 254.090714] ? _raw_spin_unlock_irq+0x27/0x70 [ 254.095185] ? finish_task_switch+0x1c1/0x7e0 [ 254.099660] ? syscall_return_slowpath+0x550/0x550 [ 254.104569] ? syscall_return_slowpath+0x2ac/0x550 [ 254.109479] ? prepare_exit_to_usermode+0x350/0x350 [ 254.114474] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 254.119823] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.124652] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 254.129819] RIP: 0033:0x4548b9 [ 254.132986] RSP: 002b:00007f09c9a11c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.140677] RAX: ffffffffffffffda RBX: 00007f09c9a126d4 RCX: 00000000004548b9 [ 254.147927] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 254.155174] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 254.162422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 254.169669] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 2018/03/29 10:21:00 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000004c0)=""/237, 0x171}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f0000000000)=""/130, 0x82, 0xfffffffffffffff7}, 0x100) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='overlay\x00', 0x40000, &(0x7f00000005c0)="b383b37f99b95f5eeff2d7e8e7000002899ff50c8476635bb686709b61175b9e94efdcfe9c14501913c352e88a1c220d23480094ba7b877af051dd35439f56b65c5918946559d3883e4b9e735647d789c7216f65223a9f8fac4e03bcca0fbfbf1f4a2540298769caf7612d576fda5d796159064b170474c03710dedc617ebc328c56611fa9b093ac859403cc436836a34e641e4a381e42c316178db07c07891f726d280e23fc2e57724c8afc0b1a2571678cc40a219d881a89bf71fecf5444b2071d684c9569b4e1f87c0ad70f5dc6b85eddf7") socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 2 (fault-call:1 fault-nth:4): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:00 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 254.364363] FAULT_INJECTION: forcing a failure. [ 254.364363] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 254.376192] CPU: 1 PID: 4561 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 254.383371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.392714] Call Trace: [ 254.395293] dump_stack+0x194/0x24d [ 254.398913] ? arch_local_irq_restore+0x53/0x53 [ 254.403574] should_fail+0x8c0/0xa40 [ 254.407266] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 254.412353] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 254.417529] ? trace_event_raw_event_lock+0x340/0x340 [ 254.422701] ? find_held_lock+0x35/0x1d0 [ 254.426739] ? trace_hardirqs_off+0x10/0x10 [ 254.431049] ? __is_insn_slot_addr+0x1fc/0x330 [ 254.435610] ? perf_trace_lock+0xd6/0x900 [ 254.439739] ? trace_event_raw_event_lock+0x340/0x340 [ 254.444910] ? should_fail+0x23b/0xa40 [ 254.448783] ? is_bpf_text_address+0x7b/0x120 [ 254.453265] __alloc_pages_nodemask+0x327/0xdd0 [ 254.457912] ? lock_release+0xa40/0xa40 [ 254.461866] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 254.466866] ? find_held_lock+0x35/0x1d0 [ 254.470941] ? check_same_owner+0x320/0x320 [ 254.475247] cache_grow_begin+0x72/0x640 [ 254.479291] kmem_cache_alloc+0x400/0x760 [ 254.483428] ? map_files_get_link+0x3a0/0x3a0 [ 254.487934] getname_flags+0xcb/0x580 [ 254.491821] user_path_at_empty+0x2d/0x50 [ 254.495948] do_mount+0x15f/0x2bb0 [ 254.499470] ? copy_mount_string+0x40/0x40 [ 254.503682] ? rcu_pm_notify+0xc0/0xc0 [ 254.507562] ? copy_mount_options+0x5f/0x2e0 [ 254.511944] ? rcu_read_lock_sched_held+0x108/0x120 [ 254.516935] ? kmem_cache_alloc_trace+0x459/0x740 [ 254.521755] ? kasan_check_write+0x14/0x20 [ 254.525972] ? _copy_from_user+0x99/0x110 [ 254.530106] ? copy_mount_options+0x1f7/0x2e0 [ 254.534583] SyS_mount+0xab/0x120 [ 254.538018] ? copy_mnt_ns+0xb30/0xb30 [ 254.541976] do_syscall_64+0x281/0x940 [ 254.545839] ? __do_page_fault+0xc90/0xc90 [ 254.550053] ? _raw_spin_unlock_irq+0x27/0x70 [ 254.554525] ? finish_task_switch+0x1c1/0x7e0 [ 254.558996] ? syscall_return_slowpath+0x550/0x550 [ 254.563905] ? syscall_return_slowpath+0x2ac/0x550 [ 254.568820] ? prepare_exit_to_usermode+0x350/0x350 [ 254.573815] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 254.579159] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 254.583983] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 254.589147] RIP: 0033:0x4548b9 [ 254.592311] RSP: 002b:00007f09c9a11c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 254.599993] RAX: ffffffffffffffda RBX: 00007f09c9a126d4 RCX: 00000000004548b9 [ 254.607239] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 2018/03/29 10:21:00 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) [ 254.614481] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 254.621726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 254.628972] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 2018/03/29 10:21:00 executing program 2 (fault-call:1 fault-nth:5): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:00 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='..', 0x0, 0x18}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000080)={r0, r3}) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) socketpair(0x1b, 0xa, 0x20, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 6: r0 = perf_event_open(&(0x7f0000000d40)={0x3, 0x70, 0x0, 0x2, 0x6, 0x1, 0x0, 0x2, 0x3b096c9c35654620, 0x0, 0x9, 0x9, 0x3, 0x101, 0x7, 0x1f, 0xfffffffffffffffa, 0x20, 0x5, 0x20, 0x3f, 0x6, 0xf7, 0x0, 0x8, 0x200, 0x800, 0x3, 0x1, 0x7, 0x3, 0x1bd9, 0x4, 0x9, 0x8, 0x80000001, 0x80, 0x7fffffff, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f00000003c0), 0xc}, 0x1000, 0xfffffffffffffff7, 0x3, 0x3, 0x10001, 0x3, 0x8}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000dc0)) sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r1}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff9) 2018/03/29 10:21:00 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:00 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={0xffffffffffffffff, &(0x7f00000001c0)="681cd15f9502ee23785652e906a507de7cbd106021f96c5b605ec1d6878679a1d9cfe34c1507834b3291d7e953764f4399b2a58d0dda3bc981ee5f3392988005f2b87389c1de663ac5b70703115813ce1d3cf5e3b4ac809d9c4f2101adf3b5d8", &(0x7f00000004c0)="4d4cb197ccf4f4386372cd74bac43a2cee4b05fbc0c27aafa0c5a57976b98d6055d922513691680fb95f5fc568dd8ea8f93b2c85cca13ae83ce4bef8447ac9979b63d66a8e5961958d09fc76c0df0728b895c79f246d203754086070e23c8629cb3a67f2e2d63c42271bfaa39c6684fc651de0d0c256b19884a4d2c42f03834a8e4055276b994c93d8297fe5b281ff97646ae629ed91db3274c2c70a98dcab5a1e610b17bb0feed6a0b40b34708657b919ab9a312e9d234e2a40ffaf4d67ea904b67d12153a2d7a0f515b611703f605fe9645c25fd9ed7fa12883003c3be7eec5ee9b9aa3611a530", 0x3}, 0x20) mount(&(0x7f0000000000)='..', &(0x7f0000000040)='..', &(0x7f0000000080)='pipefs\x00', 0x895ee136fde79ab5, &(0x7f0000000140)="50d5a4a0") socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x100000000, 0x2, 0x100000000000, 0xffffffffffffffff, 0xa27d}, 0x2c) 2018/03/29 10:21:00 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:00 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:00 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x0, &(0x7f00000003c0)=@raw, &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x1, 0x10}, 0xc) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000ec0)={r2, &(0x7f0000000d40)="abb528b26592826d73058a0e5fa172c52d0927c21585036a24d1e97123ea6d50702cba7bfcfeb5186c7f587596bfe2c0a45047043946ad831a0ca2511378f14b26baba3da20175807ef52775b06a11b2adbe60aced3984431bd81230c84d7e654fd6", &(0x7f0000000dc0)=""/204}, 0x18) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x18}, 0x10) socketpair$inet6(0xa, 0x3, 0x2, &(0x7f0000000f00)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='G1L\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:00 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:01 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r3}, 0x10) socketpair$inet(0x2, 0x2, 0x1, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r2, 0x28, &(0x7f0000000080)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:01 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f00000000c0)={r0, r3}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) recvmsg(r3, &(0x7f0000000140)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000680)=[{&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000000080)=""/48, 0x30}, {&(0x7f00000004c0)=""/199, 0xc7}, {&(0x7f0000000380)=""/178, 0xb2}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f00000005c0)=""/166, 0xa6}], 0x6, &(0x7f0000002280)=""/4096, 0x1000}, 0x120) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:01 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:01 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:01 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:01 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:01 executing program 6 (fault-call:9 fault-nth:0): sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:01 executing program 2 (fault-call:1 fault-nth:6): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:01 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r0, 0x28}, 0x10) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) [ 255.189474] FAULT_INJECTION: forcing a failure. [ 255.189474] name failslab, interval 1, probability 0, space 0, times 0 [ 255.200790] CPU: 0 PID: 4659 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #40 [ 255.207970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.217304] Call Trace: [ 255.219882] dump_stack+0x194/0x24d [ 255.223497] ? arch_local_irq_restore+0x53/0x53 [ 255.228147] ? trace_hardirqs_off+0x10/0x10 [ 255.232464] should_fail+0x8c0/0xa40 [ 255.236163] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 255.241256] ? __f_unlock_pos+0x19/0x20 [ 255.245235] ? find_held_lock+0x35/0x1d0 [ 255.249307] ? check_same_owner+0x320/0x320 [ 255.253623] ? vfs_write+0x374/0x510 [ 255.257325] ? rcu_note_context_switch+0x710/0x710 [ 255.262246] should_failslab+0xec/0x120 [ 255.266202] kmem_cache_alloc+0x47/0x760 [ 255.270257] getname_flags+0xcb/0x580 [ 255.274043] SyS_mkdir+0xc1/0x2a0 [ 255.277483] ? SyS_mkdirat+0x2b0/0x2b0 [ 255.281351] ? do_syscall_64+0xb7/0x940 [ 255.285308] ? SyS_mkdirat+0x2b0/0x2b0 [ 255.289179] do_syscall_64+0x281/0x940 [ 255.293043] ? __do_page_fault+0xc90/0xc90 [ 255.297256] ? _raw_spin_unlock_irq+0x27/0x70 [ 255.301768] ? finish_task_switch+0x1c1/0x7e0 [ 255.306252] ? syscall_return_slowpath+0x550/0x550 [ 255.311162] ? syscall_return_slowpath+0x2ac/0x550 [ 255.316072] ? prepare_exit_to_usermode+0x350/0x350 [ 255.321067] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 255.326426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 255.331260] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 255.336428] RIP: 0033:0x4548b9 2018/03/29 10:21:01 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:01 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:01 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x0, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 255.339600] RSP: 002b:00007fcc82849c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 255.347288] RAX: ffffffffffffffda RBX: 00007fcc8284a6d4 RCX: 00000000004548b9 [ 255.354538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 255.361785] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 255.369031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 255.376278] R13: 00000000000003ea R14: 00000000006f7e90 R15: 0000000000000000 2018/03/29 10:21:01 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x1b, 0x805, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000001c0)='..', r2}, 0x1000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r2, 0x6, 0x2}, 0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x807, 0x9c8, &(0x7f0000000040)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:01 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x8, 0xffffffff, 0x8000, 0x6, 0xffffffffffffffff, 0x1000}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) socketpair(0x1, 0x807, 0x6f6, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:01 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:01 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:01 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 256.121183] IPVS: ftp: loaded support on port[0] = 21 [ 256.149893] FAULT_INJECTION: forcing a failure. [ 256.149893] name failslab, interval 1, probability 0, space 0, times 0 [ 256.161151] CPU: 0 PID: 4703 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 256.168326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.177673] Call Trace: [ 256.180251] dump_stack+0x194/0x24d [ 256.183858] ? arch_local_irq_restore+0x53/0x53 [ 256.188507] ? lock_downgrade+0x980/0x980 [ 256.192643] should_fail+0x8c0/0xa40 [ 256.196336] ? trace_hardirqs_off+0x10/0x10 [ 256.200641] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.205724] ? rcutorture_record_progress+0x10/0x10 [ 256.210725] ? is_bpf_text_address+0xa4/0x120 [ 256.215204] ? kernel_text_address+0x102/0x140 [ 256.219770] ? find_held_lock+0x35/0x1d0 [ 256.223837] ? check_same_owner+0x320/0x320 [ 256.228134] ? putname+0xee/0x130 [ 256.231562] ? filename_lookup+0x315/0x500 [ 256.235770] ? user_path_at_empty+0x40/0x50 [ 256.240078] ? rcu_note_context_switch+0x710/0x710 [ 256.244985] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.250336] should_failslab+0xec/0x120 [ 256.254286] kmem_cache_alloc+0x47/0x760 [ 256.258333] ? free_obj_work+0x690/0x690 [ 256.262378] alloc_vfsmnt+0xe0/0x9c0 [ 256.266070] ? path_lookupat+0x238/0xba0 [ 256.270118] ? mnt_free_id.isra.21+0x50/0x50 [ 256.274511] ? trace_hardirqs_off+0x10/0x10 [ 256.278815] ? putname+0xee/0x130 [ 256.282251] ? putname+0xee/0x130 [ 256.285680] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.290679] ? find_held_lock+0x35/0x1d0 [ 256.294727] ? __get_fs_type+0x8a/0xc0 [ 256.298594] ? lock_downgrade+0x980/0x980 [ 256.302733] ? module_unload_free+0x5b0/0x5b0 [ 256.307213] ? lock_release+0xa40/0xa40 [ 256.311171] ? mpi_resize+0x200/0x200 [ 256.314955] vfs_kern_mount.part.26+0x84/0x4a0 [ 256.319516] ? may_umount+0xa0/0xa0 [ 256.323122] ? _raw_read_unlock+0x22/0x30 [ 256.327248] ? __get_fs_type+0x8a/0xc0 [ 256.331120] do_mount+0xea4/0x2bb0 [ 256.334647] ? copy_mount_string+0x40/0x40 [ 256.338859] ? rcu_pm_notify+0xc0/0xc0 [ 256.342732] ? copy_mount_options+0x5f/0x2e0 [ 256.347117] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.352112] ? kmem_cache_alloc_trace+0x459/0x740 [ 256.356934] ? kasan_check_write+0x14/0x20 [ 256.361155] ? copy_mount_options+0x1f7/0x2e0 [ 256.365631] SyS_mount+0xab/0x120 [ 256.369059] ? copy_mnt_ns+0xb30/0xb30 [ 256.372927] do_syscall_64+0x281/0x940 [ 256.376791] ? __do_page_fault+0xc90/0xc90 [ 256.381000] ? _raw_spin_unlock_irq+0x27/0x70 [ 256.385476] ? finish_task_switch+0x1c1/0x7e0 [ 256.390040] ? syscall_return_slowpath+0x550/0x550 [ 256.394947] ? syscall_return_slowpath+0x2ac/0x550 [ 256.399864] ? prepare_exit_to_usermode+0x350/0x350 [ 256.404859] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 256.410207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.415042] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.420207] RIP: 0033:0x4548b9 [ 256.423378] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 256.431074] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 256.438321] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 2018/03/29 10:21:02 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x0, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:02 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x400001, 0x0, 0x209e1f, 0x8000000001, 0x8}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:02 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x7, 0xa, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x24}, @map={0x18, 0x2, 0x1, 0x0, r2}, @ldst={0x0, 0x1, 0x0, 0x0, 0x3, 0xfffffff4, 0x18}, @jmp={0x5, 0x3, 0x9, 0xf, 0x9, 0x20, 0xfffffffffffffffc}, @ldst={0x1, 0x3, 0x1, 0x9, 0x7, 0x6, 0x8718cd11d09c7dba}], &(0x7f0000000080)='syzkaller\x00', 0x8000, 0x37, &(0x7f00000001c0)=""/55, 0x41f00, 0x1}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000200)='..', r3}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000d, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:02 executing program 6 (fault-call:9 fault-nth:1): sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:02 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:02 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:02 executing program 2 (fault-call:1 fault-nth:7): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:02 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 256.445568] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 256.452816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 256.460062] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 [ 256.522776] FAULT_INJECTION: forcing a failure. [ 256.522776] name failslab, interval 1, probability 0, space 0, times 0 [ 256.534146] CPU: 0 PID: 4727 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 256.541332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.550671] Call Trace: [ 256.553246] dump_stack+0x194/0x24d [ 256.556859] ? arch_local_irq_restore+0x53/0x53 [ 256.561506] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 256.566691] should_fail+0x8c0/0xa40 [ 256.570388] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 256.575486] ? perf_trace_lock+0xd6/0x900 [ 256.579611] ? find_held_lock+0x35/0x1d0 [ 256.583658] ? find_held_lock+0x35/0x1d0 [ 256.587728] ? check_same_owner+0x320/0x320 [ 256.592039] ? rcu_note_context_switch+0x710/0x710 [ 256.596947] ? find_held_lock+0x35/0x1d0 [ 256.600996] should_failslab+0xec/0x120 [ 256.604952] kmem_cache_alloc_trace+0x4b/0x740 [ 256.609512] ? lock_downgrade+0x980/0x980 [ 256.613640] ? lock_release+0xa40/0xa40 [ 256.617599] kernfs_mount_ns+0xb5/0x8b0 [ 256.621556] ? kernfs_super_ns+0x70/0x70 [ 256.625611] sysfs_mount+0xc2/0x1c0 [ 256.629220] ? sysfs_kill_sb+0x40/0x40 [ 256.633087] ? alloc_pages_current+0xbe/0x1e0 [ 256.637564] ? security_sb_copy_data+0x81/0xb0 [ 256.642130] mount_fs+0x66/0x2d0 [ 256.645481] vfs_kern_mount.part.26+0xc6/0x4a0 [ 256.650044] ? may_umount+0xa0/0xa0 [ 256.653650] ? _raw_read_unlock+0x22/0x30 [ 256.657777] ? __get_fs_type+0x8a/0xc0 [ 256.661650] do_mount+0xea4/0x2bb0 [ 256.665180] ? copy_mount_string+0x40/0x40 [ 256.669395] ? rcu_pm_notify+0xc0/0xc0 [ 256.673272] ? copy_mount_options+0x5f/0x2e0 [ 256.678520] ? rcu_read_lock_sched_held+0x108/0x120 [ 256.683518] ? kmem_cache_alloc_trace+0x459/0x740 [ 256.688346] ? kasan_check_write+0x14/0x20 [ 256.692557] ? _copy_from_user+0x99/0x110 [ 256.696693] ? copy_mount_options+0x1f7/0x2e0 [ 256.701783] SyS_mount+0xab/0x120 [ 256.705215] ? copy_mnt_ns+0xb30/0xb30 [ 256.709083] do_syscall_64+0x281/0x940 [ 256.712946] ? __do_page_fault+0xc90/0xc90 [ 256.717155] ? _raw_spin_unlock_irq+0x27/0x70 [ 256.721631] ? finish_task_switch+0x1c1/0x7e0 [ 256.726104] ? syscall_return_slowpath+0x550/0x550 [ 256.731020] ? syscall_return_slowpath+0x2ac/0x550 [ 256.735932] ? prepare_exit_to_usermode+0x350/0x350 [ 256.740927] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 256.746274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 256.751102] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 256.756267] RIP: 0033:0x4548b9 [ 256.759432] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:21:02 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x4, 0x8, 0x8001, 0xfffffffffffffff7, 0x0, 0x4, 0x8c200, 0x8, 0x6, 0x4, 0x0, 0x91, 0x3, 0x5, 0x100, 0x2, 0xc9, 0x7, 0x80, 0x7, 0x0, 0x4, 0x12000, 0x4, 0x7fffffff, 0x1, 0x20, 0x6, 0x8001, 0xffff, 0x5, 0x80, 0xa400, 0x100, 0x3dc, 0xe562, 0x0, 0x5, 0x3, @perf_config_ext={0x101, 0x4}, 0x100, 0x0, 0xb7b, 0x3, 0x8000, 0x0, 0x8}, 0x0, 0x6, 0xffffffffffffff9c, 0x1) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x6, 0x89, 0x7fffffff, 0x0, 0x4, 0x1c032, 0x5, 0xb1de, 0x2, 0x1ff, 0x0, 0x800, 0x9, 0x7f, 0x8, 0x9, 0x0, 0x3, 0x9, 0x8000, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x1d8, 0x0, 0x7ff, 0x8000, 0x8e, 0x8, 0x7, 0x7fffffff80, 0x1, 0x5, 0x1, 0x4b4d, 0x3, 0x0, 0x40, 0x1, @perf_config_ext={0x0, 0x4}, 0x8, 0x7, 0xfffffffffffffff8, 0x2, 0xb80, 0x10000, 0x100}, r0, 0x0, r1, 0x2) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair(0x2, 0x800, 0x3f, &(0x7f0000000080)={0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x3ff, 0x3, 0x7fff, 0x7fff, 0x0, 0x2, 0x40000, 0x4, 0x5, 0x7, 0x661, 0x7, 0x40, 0x8001, 0x40, 0x5, 0x3ff, 0x6, 0x1, 0x8, 0x4, 0xb8b7, 0x7, 0x2, 0x200, 0x7fffffff, 0x0, 0x7, 0x4, 0x80000000, 0x9, 0x0, 0x6, 0x1ff, 0x100, 0x1000, 0x0, 0x100000001, 0x0, @perf_config_ext={0x200, 0x1f}, 0x20, 0x68, 0x8001, 0x5, 0x73b4, 0x9, 0x80000000}, 0x0, 0x7, 0xffffffffffffffff, 0xb) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f0000000140)='..', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg(r4, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r6, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) r7 = perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x0, 0x8, 0x2, 0x581, 0x0, 0x6a6, 0x4, 0xa, 0x1, 0xb3d7, 0xe63e, 0x55, 0x4, 0xe0, 0x0, 0x200000000, 0x101, 0xf2a7, 0x3, 0x5, 0xc171, 0x6, 0x100, 0x2925, 0x9, 0xffffffffffffff65, 0x1, 0x101, 0x4, 0xffffffffffffffc0, 0x9, 0x428, 0x100, 0x6, 0x80, 0x401, 0x0, 0x2, 0x1, @perf_config_ext={0x7fff, 0x3bdb}, 0x20, 0x3, 0x8, 0x7, 0x10001, 0x4, 0x8}, 0xffffffffffffffff, 0x6, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x1f) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r6, 0xa27d}, 0x2c) [ 256.767116] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 256.774362] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 256.781609] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 256.788858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 256.796106] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 2018/03/29 10:21:02 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x0, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 256.835776] FAULT_INJECTION: forcing a failure. [ 256.835776] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.847618] CPU: 0 PID: 4718 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #40 [ 256.854810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.864164] Call Trace: [ 256.866764] dump_stack+0x194/0x24d [ 256.870407] ? arch_local_irq_restore+0x53/0x53 [ 256.875109] should_fail+0x8c0/0xa40 [ 256.878835] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/29 10:21:03 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 256.883948] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 256.889135] ? find_held_lock+0x35/0x1d0 [ 256.893212] ? perf_trace_lock+0xd6/0x900 [ 256.897371] ? trace_event_raw_event_lock+0x340/0x340 [ 256.902558] ? _parse_integer+0x140/0x140 [ 256.906709] ? check_same_owner+0x320/0x320 [ 256.911035] ? perf_trace_lock+0xd6/0x900 [ 256.915191] ? trace_hardirqs_off+0x10/0x10 [ 256.919511] ? trace_event_raw_event_lock+0x340/0x340 [ 256.924693] ? perf_trace_lock+0xd6/0x900 [ 256.928830] ? should_fail+0x23b/0xa40 [ 256.932726] __alloc_pages_nodemask+0x327/0xdd0 [ 256.937407] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 256.942411] ? __f_unlock_pos+0x19/0x20 [ 256.946388] ? find_held_lock+0x35/0x1d0 [ 256.950461] ? check_same_owner+0x320/0x320 [ 256.954767] ? vfs_write+0x374/0x510 [ 256.958478] cache_grow_begin+0x72/0x640 [ 256.962547] kmem_cache_alloc+0x400/0x760 [ 256.966690] getname_flags+0xcb/0x580 [ 256.970486] SyS_mkdir+0xc1/0x2a0 [ 256.973923] ? SyS_mkdirat+0x2b0/0x2b0 [ 256.977799] ? do_syscall_64+0xb7/0x940 [ 256.981772] ? SyS_mkdirat+0x2b0/0x2b0 [ 256.985652] do_syscall_64+0x281/0x940 [ 256.989524] ? __do_page_fault+0xc90/0xc90 [ 256.993737] ? _raw_spin_unlock_irq+0x27/0x70 [ 256.998211] ? finish_task_switch+0x1c1/0x7e0 [ 257.002685] ? syscall_return_slowpath+0x550/0x550 [ 257.007592] ? syscall_return_slowpath+0x2ac/0x550 [ 257.012499] ? prepare_exit_to_usermode+0x350/0x350 [ 257.017497] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 257.022842] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.027675] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.032849] RIP: 0033:0x4548b9 2018/03/29 10:21:03 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xfffffffffffffd47}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:03 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e1", 0x2d}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:03 executing program 2 (fault-call:1 fault-nth:8): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:03 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 257.036024] RSP: 002b:00007fcc82849c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 257.043715] RAX: ffffffffffffffda RBX: 00007fcc8284a6d4 RCX: 00000000004548b9 [ 257.050965] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 257.058213] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 257.065474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 257.072722] R13: 00000000000003ea R14: 00000000006f7e90 R15: 0000000000000001 2018/03/29 10:21:03 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x0, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:03 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) r3 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xfc3f, 0x10000, 0x7, 0x9b51, 0x0, 0xfffffffffffffe01, 0x8100, 0x2, 0x8000, 0x2, 0x10000, 0xb92, 0x4, 0x5, 0x20, 0x9, 0x180, 0x7, 0x0, 0x200, 0x3f72, 0x6, 0x2, 0x10001, 0x1, 0x5, 0x8000, 0x6, 0x1, 0x0, 0x7, 0x1ff, 0x46, 0x799, 0x7, 0xf86a, 0x0, 0x100000000, 0x2, @perf_config_ext={0x10001, 0x3}, 0x2, 0x80000001, 0x401, 0x7, 0x0, 0x2, 0x5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2030) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 257.163984] FAULT_INJECTION: forcing a failure. [ 257.163984] name failslab, interval 1, probability 0, space 0, times 0 [ 257.175325] CPU: 1 PID: 4770 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 257.182521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.191906] Call Trace: [ 257.194503] dump_stack+0x194/0x24d [ 257.198145] ? arch_local_irq_restore+0x53/0x53 [ 257.202820] should_fail+0x8c0/0xa40 [ 257.206523] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.211616] ? lock_downgrade+0x980/0x980 [ 257.215781] ? __free_insn_slot+0x5c0/0x5c0 [ 257.220120] ? find_held_lock+0x35/0x1d0 [ 257.224197] ? check_same_owner+0x320/0x320 [ 257.228505] ? sget_userns+0x27d/0xe40 [ 257.232398] ? rcu_note_context_switch+0x710/0x710 [ 257.237342] should_failslab+0xec/0x120 [ 257.241301] kmem_cache_alloc_trace+0x4b/0x740 [ 257.245862] ? sysfs_mount+0xc2/0x1c0 [ 257.249654] ? mount_fs+0x66/0x2d0 [ 257.253181] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 257.257929] ? do_mount+0xea4/0x2bb0 [ 257.261626] ? SyS_mount+0xab/0x120 [ 257.265238] ? do_syscall_64+0x281/0x940 [ 257.269305] sget_userns+0x2a3/0xe40 [ 257.273008] ? kernfs_sop_show_path+0x190/0x190 [ 257.277679] ? kernfs_sop_show_options+0x180/0x180 [ 257.282597] ? destroy_unused_super.part.6+0xd0/0xd0 [ 257.287687] ? check_same_owner+0x320/0x320 [ 257.291988] ? rcu_pm_notify+0xc0/0xc0 [ 257.295895] ? kernfs_mount_ns+0xb5/0x8b0 [ 257.300036] ? rcu_read_lock_sched_held+0x108/0x120 [ 257.305045] ? kmem_cache_alloc_trace+0x459/0x740 [ 257.309878] ? lock_downgrade+0x980/0x980 [ 257.314042] kernfs_mount_ns+0x13d/0x8b0 [ 257.318089] ? kernfs_super_ns+0x70/0x70 [ 257.322142] sysfs_mount+0xc2/0x1c0 [ 257.325750] ? sysfs_kill_sb+0x40/0x40 [ 257.329619] ? alloc_pages_current+0xbe/0x1e0 [ 257.334108] ? security_sb_copy_data+0x81/0xb0 [ 257.338686] mount_fs+0x66/0x2d0 [ 257.342049] vfs_kern_mount.part.26+0xc6/0x4a0 [ 257.346624] ? may_umount+0xa0/0xa0 [ 257.350256] ? _raw_read_unlock+0x22/0x30 [ 257.354390] ? __get_fs_type+0x8a/0xc0 [ 257.358269] do_mount+0xea4/0x2bb0 [ 257.361803] ? copy_mount_string+0x40/0x40 [ 257.366022] ? rcu_pm_notify+0xc0/0xc0 [ 257.369916] ? copy_mount_options+0x5f/0x2e0 [ 257.374308] ? rcu_read_lock_sched_held+0x108/0x120 [ 257.379298] ? kmem_cache_alloc_trace+0x459/0x740 [ 257.384120] ? kasan_check_write+0x14/0x20 [ 257.388340] ? _copy_from_user+0x99/0x110 [ 257.392473] ? copy_mount_options+0x1f7/0x2e0 [ 257.396951] SyS_mount+0xab/0x120 [ 257.400382] ? copy_mnt_ns+0xb30/0xb30 [ 257.404259] do_syscall_64+0x281/0x940 [ 257.408131] ? __do_page_fault+0xc90/0xc90 [ 257.412340] ? _raw_spin_unlock_irq+0x27/0x70 [ 257.416815] ? finish_task_switch+0x1c1/0x7e0 [ 257.421299] ? syscall_return_slowpath+0x550/0x550 [ 257.426205] ? syscall_return_slowpath+0x2ac/0x550 [ 257.431109] ? prepare_exit_to_usermode+0x350/0x350 [ 257.436105] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 257.441447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.446275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.451436] RIP: 0033:0x4548b9 [ 257.454598] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:21:03 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:03 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x0, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:03 executing program 6 (fault-call:9 fault-nth:2): sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:03 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={&(0x7f0000000040)='..'}, 0xffffffffffffffd5) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:03 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x2, 0x1, 0x209e21, 0x8000000001, 0x4}, 0x2c) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(r0, &(0x7f0000000380)={&(0x7f00000001c0)=@nfc_llcp={0x27, 0x1, 0x0, 0x4, 0xaf2, 0x101, "0ef3e20e98984020d1a264a709d9280352d395c315549dabed3994561b603cac98c900c97305161a6b91f3999aae9bdeee92efd44b39fb0d961e02a66fed6e", 0x27}, 0x80, &(0x7f0000000140)=[{&(0x7f00000004c0)="8e95b7ac528bcebb35bf10a39cdbc51ffcf4c861b3291b1ce9db025dc9103a2499b87689dff605112091313a853628ca8be7a0b1058855b9f6d2470e931ee21a2858af6a8cb8d7de0e5ae2d85a3a2a4f735c958a587d3ab0ec11e15c36d6c410415654f84bb6741710ce597393c51106512d821f34957a465ae4836962e9bef8a8d74dd051a1d4d6c6eab832da309e338be14474d88df2b5d9416c07db0f82b41e58a99a1e2eb54a787acfaba96aeb53fba894d5662a947e04b8c76a0bc710fac6937b49903341d467d3369ef24c77d41d", 0xd1}], 0x1, 0x0, 0x0, 0x4000000}, 0x4080) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0x4) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000080)={r1, r5}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:03 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:03 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e1", 0x2d}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:03 executing program 2 (fault-call:1 fault-nth:9): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) [ 257.462282] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 257.469532] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 257.476778] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 257.484030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 257.491283] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 257.580831] FAULT_INJECTION: forcing a failure. [ 257.580831] name failslab, interval 1, probability 0, space 0, times 0 [ 257.592482] CPU: 0 PID: 4806 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 257.599677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.609029] Call Trace: [ 257.611629] dump_stack+0x194/0x24d [ 257.615268] ? arch_local_irq_restore+0x53/0x53 [ 257.619945] should_fail+0x8c0/0xa40 [ 257.623664] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.628765] ? find_next_zero_bit+0xe3/0x110 [ 257.633155] ? trace_hardirqs_off+0x10/0x10 [ 257.637462] ? __lock_is_held+0xb6/0x140 [ 257.641507] ? find_held_lock+0x35/0x1d0 [ 257.645555] ? __lock_is_held+0xb6/0x140 [ 257.649612] ? check_same_owner+0x320/0x320 [ 257.653912] ? rcu_note_context_switch+0x710/0x710 [ 257.658817] ? rcu_note_context_switch+0x710/0x710 [ 257.663737] should_failslab+0xec/0x120 [ 257.667690] __kmalloc+0x63/0x760 [ 257.671131] ? lockdep_init_map+0x9/0x10 [ 257.675172] ? debug_mutex_init+0x2d/0x60 [ 257.679298] ? __list_lru_init+0xcf/0x750 [ 257.683433] __list_lru_init+0xcf/0x750 [ 257.687394] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 257.693260] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 257.698257] ? __lockdep_init_map+0xe4/0x650 [ 257.702648] ? lockdep_init_map+0x9/0x10 [ 257.706695] sget_userns+0x691/0xe40 [ 257.710387] ? kernfs_sop_show_path+0x190/0x190 [ 257.715041] ? kernfs_sop_show_options+0x180/0x180 [ 257.719962] ? destroy_unused_super.part.6+0xd0/0xd0 [ 257.725062] ? check_same_owner+0x320/0x320 [ 257.729365] ? rcu_pm_notify+0xc0/0xc0 [ 257.733248] ? rcu_read_lock_sched_held+0x108/0x120 [ 257.738244] ? kmem_cache_alloc_trace+0x459/0x740 [ 257.743065] ? lock_downgrade+0x980/0x980 [ 257.747205] kernfs_mount_ns+0x13d/0x8b0 [ 257.751250] ? kernfs_super_ns+0x70/0x70 [ 257.755306] sysfs_mount+0xc2/0x1c0 [ 257.758911] ? sysfs_kill_sb+0x40/0x40 [ 257.762780] ? alloc_pages_current+0xbe/0x1e0 [ 257.767257] ? security_sb_copy_data+0x81/0xb0 [ 257.771820] mount_fs+0x66/0x2d0 [ 257.775172] vfs_kern_mount.part.26+0xc6/0x4a0 [ 257.779734] ? may_umount+0xa0/0xa0 [ 257.783338] ? _raw_read_unlock+0x22/0x30 [ 257.787462] ? __get_fs_type+0x8a/0xc0 [ 257.791335] do_mount+0xea4/0x2bb0 [ 257.794862] ? copy_mount_string+0x40/0x40 [ 257.799074] ? rcu_pm_notify+0xc0/0xc0 [ 257.802951] ? copy_mount_options+0x5f/0x2e0 [ 257.807336] ? rcu_read_lock_sched_held+0x108/0x120 [ 257.812330] ? kmem_cache_alloc_trace+0x459/0x740 [ 257.817155] ? kasan_check_write+0x14/0x20 [ 257.821368] ? _copy_from_user+0x99/0x110 [ 257.825504] ? copy_mount_options+0x1f7/0x2e0 [ 257.829984] SyS_mount+0xab/0x120 [ 257.833414] ? copy_mnt_ns+0xb30/0xb30 [ 257.837281] do_syscall_64+0x281/0x940 [ 257.841148] ? __do_page_fault+0xc90/0xc90 [ 257.845359] ? _raw_spin_unlock_irq+0x27/0x70 [ 257.849829] ? finish_task_switch+0x1c1/0x7e0 [ 257.854314] ? syscall_return_slowpath+0x550/0x550 [ 257.859224] ? syscall_return_slowpath+0x2ac/0x550 [ 257.864131] ? prepare_exit_to_usermode+0x350/0x350 [ 257.869126] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 257.874474] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 257.879303] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 257.884467] RIP: 0033:0x4548b9 [ 257.887631] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 257.895315] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 257.902575] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 257.909826] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 257.917077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 257.924334] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 257.936624] FAULT_INJECTION: forcing a failure. [ 257.936624] name failslab, interval 1, probability 0, space 0, times 0 [ 257.948082] CPU: 1 PID: 4789 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #40 [ 257.955273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.964618] Call Trace: [ 257.967188] dump_stack+0x194/0x24d [ 257.970810] ? arch_local_irq_restore+0x53/0x53 [ 257.975475] should_fail+0x8c0/0xa40 [ 257.979173] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 257.984258] ? trace_event_raw_event_lock+0x340/0x340 [ 257.989434] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 257.994610] ? __lock_acquire+0x664/0x3e00 [ 257.998841] ? make_kprojid+0x30/0x30 [ 258.002647] ? find_held_lock+0x35/0x1d0 [ 258.006705] ? __lock_is_held+0xb6/0x140 [ 258.010763] ? check_same_owner+0x320/0x320 [ 258.015072] ? __d_lookup+0x4f4/0x830 [ 258.018866] ? rcu_note_context_switch+0x710/0x710 [ 258.023795] should_failslab+0xec/0x120 [ 258.027754] kmem_cache_alloc+0x47/0x760 [ 258.031831] __d_alloc+0xc1/0xbd0 [ 258.035276] ? shrink_dcache_for_umount+0x290/0x290 [ 258.040278] ? d_alloc_parallel+0x1b40/0x1b40 [ 258.044761] ? lock_release+0xa40/0xa40 [ 258.048719] ? mark_held_locks+0xaf/0x100 [ 258.052843] ? d_lookup+0x133/0x2e0 [ 258.056454] ? d_lookup+0x1d5/0x2e0 [ 258.060060] ? rcu_note_context_switch+0x710/0x710 [ 258.064971] d_alloc+0x8e/0x340 [ 258.068228] ? __d_alloc+0xbd0/0xbd0 [ 258.071928] ? down_write_nested+0x8b/0x120 [ 258.076253] __lookup_hash+0x58/0x190 [ 258.080046] filename_create+0x1c7/0x520 [ 258.084087] ? kern_path_mountpoint+0x40/0x40 [ 258.088591] ? getname_flags+0x256/0x580 [ 258.092654] SyS_mkdir+0xd4/0x2a0 [ 258.096107] ? SyS_mkdirat+0x2b0/0x2b0 [ 258.099991] ? do_syscall_64+0xb7/0x940 [ 258.103950] ? SyS_mkdirat+0x2b0/0x2b0 [ 258.107843] do_syscall_64+0x281/0x940 [ 258.111717] ? __do_page_fault+0xc90/0xc90 [ 258.115934] ? _raw_spin_unlock_irq+0x27/0x70 [ 258.120406] ? finish_task_switch+0x1c1/0x7e0 [ 258.124887] ? syscall_return_slowpath+0x550/0x550 [ 258.129799] ? syscall_return_slowpath+0x2ac/0x550 [ 258.134710] ? prepare_exit_to_usermode+0x350/0x350 [ 258.139713] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 258.145080] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.149932] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.155103] RIP: 0033:0x4548b9 [ 258.158274] RSP: 002b:00007fcc82849c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 258.165979] RAX: ffffffffffffffda RBX: 00007fcc8284a6d4 RCX: 00000000004548b9 [ 258.173231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 258.180476] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/29 10:21:04 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28}, 0x10) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x5, 0x0, 0x6, 0xf335, 0x0, 0x3, 0x80000, 0xb, 0xfff, 0x8, 0x2, 0x2, 0x7a, 0xfffffffffffffffd, 0x1, 0x6, 0x2, 0x7, 0x5, 0x6, 0x80000000, 0x2, 0xc000000000000000, 0x20, 0x4, 0x6b, 0x1ff, 0x138, 0x7, 0x4, 0x9, 0x8, 0x10001, 0x8, 0x7, 0x7fff, 0x0, 0x3, 0x5, @perf_config_ext={0x5, 0x8}, 0xa000, 0xc9d, 0x40, 0x4, 0x3, 0x4, 0x6}, 0x0, 0xf, r2, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4000000004, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:04 executing program 2 (fault-call:1 fault-nth:10): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:04 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:04 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:04 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x0, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:04 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r2, &(0x7f0000000380)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242d487c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bb72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a5863bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0xfffffe0d) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:04 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 258.187723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 258.194972] R13: 00000000000003ea R14: 00000000006f7e90 R15: 0000000000000002 2018/03/29 10:21:04 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e1", 0x2d}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 258.272051] FAULT_INJECTION: forcing a failure. [ 258.272051] name failslab, interval 1, probability 0, space 0, times 0 [ 258.283349] CPU: 0 PID: 4831 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 258.290533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.299874] Call Trace: [ 258.302500] dump_stack+0x194/0x24d [ 258.306133] ? arch_local_irq_restore+0x53/0x53 [ 258.310793] ? rcutorture_record_progress+0x10/0x10 [ 258.315810] should_fail+0x8c0/0xa40 [ 258.319513] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.324604] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 258.329605] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.334359] ? retint_kernel+0x10/0x10 [ 258.338257] ? lock_is_held_type+0x18b/0x210 [ 258.342665] ? check_same_owner+0x320/0x320 [ 258.346976] ? rcu_note_context_switch+0x710/0x710 [ 258.351903] should_failslab+0xec/0x120 [ 258.355863] kmem_cache_alloc_trace+0x4b/0x740 [ 258.360430] ? __kmalloc_node+0x33/0x70 [ 258.364384] ? __kmalloc_node+0x33/0x70 [ 258.368341] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.373349] __memcg_init_list_lru_node+0x169/0x270 [ 258.378371] ? list_lru_add+0x7c0/0x7c0 [ 258.382326] ? __kmalloc_node+0x47/0x70 [ 258.386301] __list_lru_init+0x544/0x750 [ 258.390357] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 258.396224] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 258.401227] ? __lockdep_init_map+0xe4/0x650 [ 258.405624] ? lockdep_init_map+0x9/0x10 [ 258.409675] sget_userns+0x691/0xe40 [ 258.413365] ? kernfs_sop_show_path+0x190/0x190 [ 258.418032] ? kernfs_sop_show_options+0x180/0x180 [ 258.422957] ? destroy_unused_super.part.6+0xd0/0xd0 [ 258.428073] ? check_same_owner+0x320/0x320 [ 258.432379] ? rcu_pm_notify+0xc0/0xc0 [ 258.436273] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.441270] ? kmem_cache_alloc_trace+0x459/0x740 [ 258.446090] ? lock_downgrade+0x980/0x980 [ 258.450243] kernfs_mount_ns+0x13d/0x8b0 [ 258.454289] ? kernfs_super_ns+0x70/0x70 [ 258.458354] sysfs_mount+0xc2/0x1c0 [ 258.461972] ? sysfs_kill_sb+0x40/0x40 [ 258.465843] ? alloc_pages_current+0xbe/0x1e0 [ 258.470321] ? security_sb_copy_data+0x81/0xb0 [ 258.474891] mount_fs+0x66/0x2d0 [ 258.478249] vfs_kern_mount.part.26+0xc6/0x4a0 [ 258.482817] ? may_umount+0xa0/0xa0 [ 258.486423] ? _raw_read_unlock+0x22/0x30 [ 258.490553] ? __get_fs_type+0x8a/0xc0 [ 258.494440] do_mount+0xea4/0x2bb0 [ 258.497977] ? copy_mount_string+0x40/0x40 [ 258.502193] ? rcu_pm_notify+0xc0/0xc0 [ 258.506084] ? copy_mount_options+0x5f/0x2e0 [ 258.510471] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.515467] ? kmem_cache_alloc_trace+0x459/0x740 [ 258.520295] ? kasan_check_write+0x14/0x20 [ 258.524508] ? _copy_from_user+0x99/0x110 [ 258.528651] ? copy_mount_options+0x1f7/0x2e0 [ 258.533137] SyS_mount+0xab/0x120 [ 258.536570] ? copy_mnt_ns+0xb30/0xb30 [ 258.540444] do_syscall_64+0x281/0x940 [ 258.544307] ? __do_page_fault+0xc90/0xc90 [ 258.548515] ? _raw_spin_unlock_irq+0x27/0x70 [ 258.552992] ? finish_task_switch+0x1c1/0x7e0 [ 258.557475] ? syscall_return_slowpath+0x550/0x550 [ 258.562388] ? syscall_return_slowpath+0x2ac/0x550 [ 258.567300] ? prepare_exit_to_usermode+0x350/0x350 [ 258.572473] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 258.577827] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 258.582664] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 258.587830] RIP: 0033:0x4548b9 [ 258.590997] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 258.598695] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 258.605945] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 258.613194] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 258.620439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 258.627687] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/29 10:21:04 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) close(r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xd, 0x6, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, r2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xea1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x1f, &(0x7f0000000080)=""/31, 0x41100, 0x1}, 0x48) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:04 executing program 2 (fault-call:1 fault-nth:11): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:04 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:04 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x0, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:04 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c4", 0x43}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:04 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000d40)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') [ 258.794175] FAULT_INJECTION: forcing a failure. [ 258.794175] name failslab, interval 1, probability 0, space 0, times 0 [ 258.805460] CPU: 0 PID: 4860 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 258.812730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.822075] Call Trace: [ 258.824648] dump_stack+0x194/0x24d [ 258.828254] ? arch_local_irq_restore+0x53/0x53 [ 258.832902] ? rcutorture_record_progress+0x10/0x10 [ 258.837904] should_fail+0x8c0/0xa40 [ 258.841596] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 258.846674] ? __kernel_text_address+0xd/0x40 [ 258.851146] ? unwind_get_return_address+0x61/0xa0 [ 258.856065] ? find_held_lock+0x35/0x1d0 [ 258.860105] ? __lock_is_held+0xb6/0x140 [ 258.864154] ? check_same_owner+0x320/0x320 [ 258.868452] ? rcu_note_context_switch+0x710/0x710 [ 258.873367] should_failslab+0xec/0x120 [ 258.877319] kmem_cache_alloc_trace+0x4b/0x740 [ 258.881876] ? __kmalloc_node+0x33/0x70 [ 258.885821] ? __kmalloc_node+0x33/0x70 [ 258.889771] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.894769] __memcg_init_list_lru_node+0x169/0x270 [ 258.899766] ? list_lru_add+0x7c0/0x7c0 [ 258.903714] ? __kmalloc_node+0x47/0x70 [ 258.907673] __list_lru_init+0x544/0x750 [ 258.911717] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 258.917576] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 258.922568] ? __lockdep_init_map+0xe4/0x650 [ 258.926953] ? lockdep_init_map+0x9/0x10 [ 258.930990] sget_userns+0x691/0xe40 [ 258.934680] ? kernfs_sop_show_path+0x190/0x190 [ 258.939331] ? kernfs_sop_show_options+0x180/0x180 [ 258.944242] ? destroy_unused_super.part.6+0xd0/0xd0 [ 258.949333] ? check_same_owner+0x320/0x320 [ 258.953628] ? rcu_pm_notify+0xc0/0xc0 [ 258.957505] ? rcu_read_lock_sched_held+0x108/0x120 [ 258.962497] ? kmem_cache_alloc_trace+0x459/0x740 [ 258.967316] ? lock_downgrade+0x980/0x980 [ 258.971447] kernfs_mount_ns+0x13d/0x8b0 [ 258.975487] ? kernfs_super_ns+0x70/0x70 [ 258.979533] sysfs_mount+0xc2/0x1c0 [ 258.983138] ? sysfs_kill_sb+0x40/0x40 [ 258.987005] ? alloc_pages_current+0xbe/0x1e0 [ 258.991484] ? security_sb_copy_data+0x81/0xb0 [ 258.996045] mount_fs+0x66/0x2d0 [ 258.999391] vfs_kern_mount.part.26+0xc6/0x4a0 [ 259.003948] ? may_umount+0xa0/0xa0 [ 259.007553] ? _raw_read_unlock+0x22/0x30 [ 259.011673] ? __get_fs_type+0x8a/0xc0 [ 259.015542] do_mount+0xea4/0x2bb0 [ 259.019067] ? copy_mount_string+0x40/0x40 [ 259.023274] ? rcu_pm_notify+0xc0/0xc0 [ 259.027153] ? copy_mount_options+0x5f/0x2e0 [ 259.031533] ? rcu_read_lock_sched_held+0x108/0x120 [ 259.036522] ? kmem_cache_alloc_trace+0x459/0x740 [ 259.041340] ? kasan_check_write+0x14/0x20 [ 259.045550] ? _copy_from_user+0x99/0x110 [ 259.049680] ? copy_mount_options+0x1f7/0x2e0 [ 259.054157] SyS_mount+0xab/0x120 [ 259.057584] ? copy_mnt_ns+0xb30/0xb30 [ 259.061448] do_syscall_64+0x281/0x940 [ 259.065307] ? __do_page_fault+0xc90/0xc90 [ 259.069512] ? _raw_spin_unlock_irq+0x27/0x70 [ 259.073983] ? finish_task_switch+0x1c1/0x7e0 [ 259.078457] ? syscall_return_slowpath+0x550/0x550 [ 259.083364] ? syscall_return_slowpath+0x2ac/0x550 [ 259.088269] ? prepare_exit_to_usermode+0x350/0x350 [ 259.093260] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 259.098603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.103428] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 259.108590] RIP: 0033:0x4548b9 [ 259.111754] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 259.119433] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 259.126674] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 259.133917] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 2018/03/29 10:21:05 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:05 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) socketpair(0x0, 0x801, 0x10000, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x5, 0x800, 0x1751a0000000, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1, 0x6, 0x209e1f, 0x8000000001, 0x11, r6}, 0xffffffffffffffed) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000005c0)) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r7, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000600)={r0, r4}) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r5, 0x0, 0x1000, 0xe, &(0x7f0000000c80)="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", &(0x7f0000000540)=""/14, 0x5, 0x9ba}, 0x28) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) recvmsg(r0, &(0x7f00000038c0)={&(0x7f0000003480)=@hci={0x0, 0x0}, 0x80, &(0x7f0000003780)=[{&(0x7f0000003500)=""/152, 0x98}, {&(0x7f00000035c0)=""/125, 0x7d}, {&(0x7f0000003640)=""/167, 0xa7}, {&(0x7f0000003700)=""/90, 0x5a}], 0x4, &(0x7f00000037c0)=""/200, 0xc8, 0x7}, 0x100) bpf$PROG_LOAD(0x5, &(0x7f0000003900)={0x2, 0x6, &(0x7f00000003c0)=@raw=[@alu={0x7, 0x9, 0x4, 0xe, 0xf, 0x2, 0x8}, @exit={0x95}, @alu={0x7, 0x125491af, 0x5, 0x2, 0x1, 0x2, 0xfffffffffffffff0}], &(0x7f0000000400)='syzkaller\x00', 0x8, 0x49, &(0x7f00000004c0)=""/73, 0x41000, 0x1, [], r9}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r8, 0x28}, 0x10) mkdir(&(0x7f0000000140)='..', 0x40) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r7, 0xa27d}, 0x2c) 2018/03/29 10:21:05 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x80000000, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x0, 0x5, 0x4, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000280)={&(0x7f0000000240)='..', r3}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r2, 0x28, &(0x7f00000001c0)}, 0x10) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000002c0)={0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='..', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x2) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={r4, &(0x7f0000000580)="98528f5089c5607f21fb352c37e893003f1d78dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f00000003c0)=""/39}, 0x18) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x4) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) [ 259.141160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 259.148405] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b 2018/03/29 10:21:05 executing program 2 (fault-call:1 fault-nth:12): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:05 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c4", 0x43}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:05 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 259.292763] FAULT_INJECTION: forcing a failure. [ 259.292763] name failslab, interval 1, probability 0, space 0, times 0 [ 259.304119] CPU: 0 PID: 4901 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 259.311313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.320667] Call Trace: [ 259.323264] dump_stack+0x194/0x24d [ 259.326901] ? arch_local_irq_restore+0x53/0x53 [ 259.331571] ? kernel_text_address+0x102/0x140 [ 259.336173] should_fail+0x8c0/0xa40 2018/03/29 10:21:05 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x0, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:05 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 259.339889] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.345035] ? save_stack+0x43/0xd0 [ 259.348657] ? kasan_kmalloc+0xad/0xe0 [ 259.352539] ? __kmalloc+0x162/0x760 [ 259.356252] ? __list_lru_init+0xcf/0x750 [ 259.360412] ? find_held_lock+0x35/0x1d0 [ 259.364481] ? __lock_is_held+0xb6/0x140 [ 259.368568] ? check_same_owner+0x320/0x320 [ 259.372894] ? rcu_note_context_switch+0x710/0x710 [ 259.377837] should_failslab+0xec/0x120 [ 259.381807] kmem_cache_alloc_node_trace+0x5a/0x760 [ 259.386817] ? mark_held_locks+0xaf/0x100 [ 259.390970] ? __raw_spin_lock_init+0x1c/0x100 [ 259.395566] __kmalloc_node+0x33/0x70 [ 259.399372] kvmalloc_node+0x99/0xd0 [ 259.403096] __list_lru_init+0x5d5/0x750 [ 259.407168] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 259.413056] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 259.418080] ? __lockdep_init_map+0xe4/0x650 [ 259.422497] ? lockdep_init_map+0x9/0x10 [ 259.426571] sget_userns+0x691/0xe40 [ 259.430280] ? kernfs_sop_show_path+0x190/0x190 [ 259.434967] ? kernfs_sop_show_options+0x180/0x180 2018/03/29 10:21:05 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000dc0)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x3, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) sendmsg$kcm(r1, &(0x7f0000001500)={&(0x7f0000000600)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x20400000}, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000e40)="5caf127fcc6352c68720ac81a4b248ff333c201bf19d5efef692c7eed804e05075f7f3f763fe4d58666fb861dbcfad5a9979881e4262898e4b9116d395e4e01efe02336e0fd4744560866411c9e29109eeb66ea4a295a0c5f3227aae4874e03c8b65cc77ec31a50b69ae00d9defe23d16d877ec70a9676a276d10f9c150c5c0369f904c3106db26450d8fcf27f5ba0faa093ac46d45c243e3f8981d1232c991bf5a6202be854c0a5ae57032d00c4e882fe5d327339114d1e518f5f", 0xbb}, {&(0x7f0000000d40)="70d69530454b502e72d24afea577b2c335882d4c0c46076c6e5930e80ec378d01836da43ce5c18c849e054eca011f71dd0c29431ec9950f89b5c447e26c9728da18f786cc340da42ca8684f9714d36c784ab6b21fa12056b1b118f62c1728f5c16306a8c379a2604140c68c1", 0x6c}, {&(0x7f0000000f00)="e1c04316ae01b0fec47de9006c5f5eef97aff9ffd592c0bd5ab2c2c4d67a0e8bcd40cf84fe0a8cc29ff5c8e8a8506478", 0x30}, {&(0x7f0000000f40)="e83209caef841f508ac58e9c5224f621dfd99b72e7a82a0cd148bd6ae7bcd6dd07fadfec5d837aff7fadc3887224330d9a22cf82c121d6b69e33588fff904d3f9cc8988bde52d0be9eb49430161ea07a85d84e44a80bb3ae55c7c530bdb6a59fc5f1f2a9c072b876a3361e07c3b24a62bde10250ab414a0547df52a3743c379584d9d97551468cb4ef8966d339223b6a1c3ff19481705e8d49c8d57b61517c09d07e80f4ddd9d3d43bb63456aeef16f0f3f066e739ee6a8f551bc8b5ed0a1cf09f114f5858e026f3939277818ebef20432b2c2d4294cdff14583e17d28c1e0", 0xdf}, {&(0x7f0000001040)="9df0da6ce812a389e508291628df8c6e49459527915707f10ab91bf65c6417a58be0ae1c0c8e03478f70c9fde51c7128e76545ea0a75bdae88bb206341fdfa01304e9265df0c285a29af2d224897a68a619459757cc6dc890df9559e46b918eeb920d1b62f30aa2ae493dff4115a", 0x6e}, {&(0x7f00000010c0)="a6b74ef982f4665e63a8b7abc567155bc264b3101ff8e453613174309695a4c3965f7928887d4eed46acf01660c856bec14afc546e52b7b7ab302a9f66bb93367e796c21971ae9d92dc8f0550b466804383497b5ac58b24dee762c7f8e5140f1527cde275113e4215908c4b6a45c86c78921ab32891ddd629f1a6d2da0cd5178cc5d5c9e5f4c954dc47b8544078f0a3b0cf59130411529d19a6f818f1fdeb1a503cfdc74bce0aeffce642ef288b5811be7b609d502d4218e76042b682c24e8c210addac02278a914d7f2323b8c4233a192", 0xd1}], 0x6, &(0x7f0000001240)=[{0x48, 0x197, 0x7, "ff91295cf529c6890d1cbaf791a55ff45516cf2e89a05f8708e06c87899cecc3ad935624f893d334f857b3f04261da70a7"}, {0xf0, 0x10f, 0x1, "a1e647eff6344b5c3b2cc92d10cb183007749c9ea283bdfca288fcfbb1cf1f154a6d63788e440b1d2b25f1ea103b2fbbeca5585cce0a58bff156b99e6d5ddf0ff685cc40537cdda3695aae7a131f34e3252e1632e4fc3d50dfc8b71a4061cb7600061a68cad9cced7c8f64bcb4428ea96436512b5142afa22b143c1eb398b4a87f72ab492ca176018ece5ef1a716d0d20b29af2f25f7acb647911c653425131e0979a87281ceeff84091293d572bf135851cc3f9126905bbe7160b3c8b5880f12d9175e564679de9c002550dab94716a312770de028a9de8a4cce6db"}, {0x100, 0x116, 0x8, "f51ce66dd720935a7a7e6445832d157d9be0b921596c88039c31de74251829c6205ab148d68107e70d633cd99ce8773d899a2a686486f3dc3dee61c8adfefe32fbf839c37e1109f5076e66ce625c1c985ffa3a4ed650d57def2f40151c77fe131d04dab357b41d462508a4760be18ea4068dfd9b4dad0fac884fcb78c9f1ad915e24c5ce2db6fec731782b3e57c5dbb2c62e3b3f344710eddee2f465f76cd0a4be6347bd14ed69e7a4edc0eee876e47ec357235a411c4d68d3965f244c1a01ac041efdc92cb3766df8dbb77a904031932d0179151df3c857c4589203d6958f576f0765087c64cfb7119c87"}, {0x60, 0x11f, 0x800, "e3cd73addeff5ac852ccb53f60e327eb7d624e92f4ca1fba8f66979785e3aa892d463dc2585c0331cb6d447a36d8be21a7c7ab9d64006bc1d2a09851915ea73e1bae98a93d1ac4875e"}], 0x298, 0x800}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') [ 259.439897] ? destroy_unused_super.part.6+0xd0/0xd0 [ 259.445013] ? check_same_owner+0x320/0x320 [ 259.449333] ? rcu_pm_notify+0xc0/0xc0 [ 259.453246] ? rcu_read_lock_sched_held+0x108/0x120 [ 259.458254] ? kmem_cache_alloc_trace+0x459/0x740 [ 259.463072] ? lock_downgrade+0x980/0x980 [ 259.467214] kernfs_mount_ns+0x13d/0x8b0 [ 259.471282] ? kernfs_super_ns+0x70/0x70 [ 259.475343] sysfs_mount+0xc2/0x1c0 [ 259.478958] ? sysfs_kill_sb+0x40/0x40 [ 259.482822] ? alloc_pages_current+0xbe/0x1e0 [ 259.487298] ? security_sb_copy_data+0x81/0xb0 [ 259.491862] mount_fs+0x66/0x2d0 [ 259.495219] vfs_kern_mount.part.26+0xc6/0x4a0 [ 259.499789] ? may_umount+0xa0/0xa0 [ 259.503395] ? _raw_read_unlock+0x22/0x30 [ 259.507516] ? __get_fs_type+0x8a/0xc0 [ 259.511405] do_mount+0xea4/0x2bb0 [ 259.514948] ? copy_mount_string+0x40/0x40 [ 259.519172] ? rcu_pm_notify+0xc0/0xc0 [ 259.523053] ? copy_mount_options+0x5f/0x2e0 [ 259.527447] ? rcu_read_lock_sched_held+0x108/0x120 [ 259.532440] ? kmem_cache_alloc_trace+0x459/0x740 [ 259.537261] ? kasan_check_write+0x14/0x20 [ 259.541480] ? copy_mount_options+0x1f7/0x2e0 [ 259.545959] SyS_mount+0xab/0x120 [ 259.549390] ? copy_mnt_ns+0xb30/0xb30 [ 259.553268] do_syscall_64+0x281/0x940 [ 259.557140] ? __do_page_fault+0xc90/0xc90 [ 259.561354] ? _raw_spin_unlock_irq+0x27/0x70 [ 259.565829] ? finish_task_switch+0x1c1/0x7e0 [ 259.570310] ? syscall_return_slowpath+0x550/0x550 [ 259.575227] ? syscall_return_slowpath+0x2ac/0x550 [ 259.580140] ? prepare_exit_to_usermode+0x350/0x350 [ 259.585148] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 259.590503] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 259.595328] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 259.600493] RIP: 0033:0x4548b9 [ 259.603665] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 259.611362] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 259.618610] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 259.625858] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 259.633113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/03/29 10:21:05 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 259.640362] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/29 10:21:05 executing program 2 (fault-call:1 fault-nth:13): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:05 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) socketpair(0x1, 0xa, 0x7, &(0x7f0000000140)) 2018/03/29 10:21:05 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:05 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff}) r3 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000d80)=r1, 0x4) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000d40)={0x0, r1, 0x6}, 0x14) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r3, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:05 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:05 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c4", 0x43}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:05 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x0, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:05 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x3, 0x7, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) sendmsg$kcm(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000140)="bd0c11830855a6cb51fe67ad1ac44dcd98f6cc752b74cfeb92a000f1486aed55121e29", 0x23}, {&(0x7f0000000c80)="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", 0x1000}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f00000001c0)="2e18953db91acc9e88901e56573ed192a7a2999aa624005899fef69afaee9136a01564cd4dbbacab6533822c25a17b34d381a704294aab168f92feb6d489d5f280c52c19486eb678ed3590b430ff9cf156412ed4b09c", 0x56}], 0x4, &(0x7f00000004c0)=[{0x90, 0x19f, 0x2, "b00299cc9c3322fe54138839a102f2b8448f0abb8a004189565b6e557ad7e3db5c531f027a0badb93ee1f0efe530fbe707951fd485f8189144a1e2cf242f91a27becc7f3ccbe8fc59a3ce6a42dcb8c4ddffb70615d3257a5b939ef739b6cfcceb841d05d2fbd4e7eb187cd265afa1ce2b0d7e8dfeb71a99ae4d7"}, {0x50, 0x11, 0xb92d, "91a9b83599cd488e4007f652bb00a595d0bc4cdaf8965cf5c138bd5030245815a20fe8903e59ded737a56dfee546ad2d0c160b611dd2043569fd13"}, {0x108, 0x0, 0xffffffff, "65d2375a2c56200e0cdad04f45a5fb4be1a3e49fc08903b8284a74c854a9bc0f15b2e2919d07782e2c44b7bc6c96f8409c5f46d4d69e70e9e91a2f16c30493d958ea6bded64558928057063cd55dd31cea975301ae3a51fc59d59d8947f5a4fb459cd63a757934e2a9f27e814a14d3687e6038ae1304dc4cbdb01bd4b81e57306152e5d4c56a47485194c917f3736821351979b6d06dcddea2cce5d0d0cdefbc036c7a30ebbdbb613e2d76dd6fc84d00b8519409479386b68607da3f3206f89aed748f5964a1578c4de15f4483e49fe9fe63889325436f229aea42fd535d95b53ca849bfcd376403e18ae0c2375be546e25f"}, {0xe0, 0x0, 0x613, "9be7653736de51de433addb8244e6fb8d88ec2166b83262c779967c882f14d280771378bb40f212dfaad6683a0a2e0e9e77629e2516b22bb5ecf6cfdd65f5f05319f649db8dfd2cc386ad77b50cf2c28d1e1950496d01259717e33fb8cdabe7d62fc6796aee394adf126862fc81e4e730eec69fc15c46f062e64e246e4d4c279e88404a4fd1c4f0cd553fb24e7f86127192b2ddb03e86d92077b6a4fe9dda02d146b14ee5d09c08cf7ce1f2c23413e2648c79fdec8cd4fed37c60ef86c58ce5eae7efca05829291c197f"}, {0x40, 0xff, 0x8, "90ef7b21586e151b127c9c2b28126a764b43830387a1a17a40a37becc6f802b10b608a8f2b6721525f3c688f"}, {0xf8, 0x111, 0x7fffffff, "5bff93d22496b777b5ebdc87aaefeef4756e61dc840985211c031e61d5e22d1c2f3884cfcb46bf6467f9c37260525253c3099389321f43c54d6188bf6a07020bfc7914e2c07dd835d5cd9acb0b1817fcf60a410990cc1b36b4cd5fc22732677e59034bd180bac843a04c356e6c97651970faf71cc80a83249f4c8eb2cbe7345ba89903516bbbb985e34a79d3babff6be6d2b3babfcf501721699bada2dc62487d2718cbf3a734afe0268f00c43128851a3bdb56a36e2218d6375183e4783d0e1b98d79b66ca2c62cde344e6c2d0568d630eaeb049b79328b7a1265b4e669a0bfaae42a6f"}], 0x400, 0x800}, 0x24008005) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$inet(0x2, 0x803, 0x1000, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x7, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) [ 259.806654] FAULT_INJECTION: forcing a failure. [ 259.806654] name failslab, interval 1, probability 0, space 0, times 0 [ 259.817932] CPU: 1 PID: 4953 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 259.825116] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.834460] Call Trace: [ 259.837035] dump_stack+0x194/0x24d [ 259.840644] ? arch_local_irq_restore+0x53/0x53 [ 259.845289] ? __save_stack_trace+0x7e/0xd0 [ 259.849600] should_fail+0x8c0/0xa40 [ 259.853292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 259.858372] ? kasan_kmalloc+0xad/0xe0 [ 259.862234] ? kmem_cache_alloc_trace+0x136/0x740 [ 259.867050] ? __memcg_init_list_lru_node+0x169/0x270 [ 259.872213] ? __list_lru_init+0x544/0x750 [ 259.876425] ? sget_userns+0x691/0xe40 [ 259.880292] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 259.885023] ? do_mount+0xea4/0x2bb0 [ 259.888714] ? SyS_mount+0xab/0x120 [ 259.892314] ? do_syscall_64+0x281/0x940 [ 259.896351] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 259.901694] ? find_held_lock+0x35/0x1d0 [ 259.905736] ? __lock_is_held+0xb6/0x140 [ 259.909790] ? check_same_owner+0x320/0x320 [ 259.914089] ? rcu_note_context_switch+0x710/0x710 [ 259.919005] should_failslab+0xec/0x120 [ 259.922959] kmem_cache_alloc_trace+0x4b/0x740 [ 259.927514] ? __kmalloc_node+0x33/0x70 [ 259.931464] ? __kmalloc_node+0x33/0x70 [ 259.935414] ? rcu_read_lock_sched_held+0x108/0x120 [ 259.940418] __memcg_init_list_lru_node+0x169/0x270 [ 259.945419] ? list_lru_add+0x7c0/0x7c0 [ 259.949367] ? __kmalloc_node+0x47/0x70 [ 259.953324] __list_lru_init+0x544/0x750 [ 259.957366] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 259.963228] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 259.968222] ? __lockdep_init_map+0xe4/0x650 [ 259.972611] ? lockdep_init_map+0x9/0x10 [ 259.976649] sget_userns+0x691/0xe40 [ 259.980335] ? kernfs_sop_show_path+0x190/0x190 [ 259.984986] ? kernfs_sop_show_options+0x180/0x180 [ 259.989894] ? destroy_unused_super.part.6+0xd0/0xd0 [ 259.994986] ? check_same_owner+0x320/0x320 [ 259.999288] ? rcu_pm_notify+0xc0/0xc0 [ 260.003161] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.008151] ? kmem_cache_alloc_trace+0x459/0x740 [ 260.012976] ? lock_downgrade+0x980/0x980 [ 260.017113] kernfs_mount_ns+0x13d/0x8b0 [ 260.021151] ? kernfs_super_ns+0x70/0x70 [ 260.025200] sysfs_mount+0xc2/0x1c0 [ 260.028803] ? sysfs_kill_sb+0x40/0x40 [ 260.032665] ? alloc_pages_current+0xbe/0x1e0 [ 260.037139] ? security_sb_copy_data+0x81/0xb0 [ 260.041698] mount_fs+0x66/0x2d0 [ 260.045045] vfs_kern_mount.part.26+0xc6/0x4a0 [ 260.049604] ? may_umount+0xa0/0xa0 [ 260.053209] ? _raw_read_unlock+0x22/0x30 [ 260.057349] ? __get_fs_type+0x8a/0xc0 [ 260.061220] do_mount+0xea4/0x2bb0 [ 260.064747] ? copy_mount_string+0x40/0x40 [ 260.068966] ? rcu_pm_notify+0xc0/0xc0 [ 260.072838] ? copy_mount_options+0x5f/0x2e0 [ 260.077220] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.082211] ? kmem_cache_alloc_trace+0x459/0x740 [ 260.087032] ? kasan_check_write+0x14/0x20 [ 260.091242] ? _copy_from_user+0x99/0x110 [ 260.095371] ? copy_mount_options+0x1f7/0x2e0 [ 260.099849] SyS_mount+0xab/0x120 [ 260.103278] ? copy_mnt_ns+0xb30/0xb30 [ 260.107142] do_syscall_64+0x281/0x940 [ 260.111006] ? __do_page_fault+0xc90/0xc90 [ 260.115215] ? _raw_spin_unlock_irq+0x27/0x70 [ 260.119683] ? finish_task_switch+0x1c1/0x7e0 [ 260.124157] ? syscall_return_slowpath+0x550/0x550 [ 260.129063] ? syscall_return_slowpath+0x2ac/0x550 [ 260.133970] ? prepare_exit_to_usermode+0x350/0x350 [ 260.138962] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 260.144309] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.149135] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.154302] RIP: 0033:0x4548b9 [ 260.157467] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 260.165149] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 260.172398] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 260.179641] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 260.186884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 260.194127] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d 2018/03/29 10:21:06 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:06 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:06 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000007780)={&(0x7f0000007400)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000007640)=[{&(0x7f0000007480)=""/27, 0x1b}, {&(0x7f00000074c0)=""/162, 0xa2}, {&(0x7f0000007580)=""/170, 0xaa}], 0x3, &(0x7f0000007680)=""/202, 0xca, 0x8}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000077c0)={0xf, 0xd, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1000}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x80}, @exit={0x95}, @jmp={0x5, 0xf7, 0x0, 0x9, 0x3, 0x80, 0x8}, @jmp={0x5, 0x5, 0x8, 0x7, 0x6, 0xffffffff, 0xfffffffffffffff0}, @generic={0x8c, 0x8, 0x0, 0x5}], {0x95}}, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x69, &(0x7f0000000380)=""/105, 0x41100, 0x1, [], r2}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000000)='..', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) 2018/03/29 10:21:06 executing program 2 (fault-call:1 fault-nth:14): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:06 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578", 0x4e}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:06 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x0, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:06 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) socketpair(0x1b, 0x0, 0x52, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x100000000) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:06 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000e80)={&(0x7f0000000e40)='./file1\x00', 0x0, 0x18}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000380)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000d40)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000000f80)='./file0\x00', &(0x7f0000000f40)='./file0\x00', &(0x7f0000000ec0)='bdev\x00', 0x4, &(0x7f0000000f00)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000001300)) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') recvmsg(r1, &(0x7f00000012c0)={&(0x7f0000000fc0)=@in6={0x0, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001280)=[{&(0x7f0000001040)=""/173, 0xad}, {&(0x7f0000001100)=""/130, 0x82}, {&(0x7f00000011c0)=""/171, 0xab}, {&(0x7f0000000f00)=""/57, 0x39}], 0x4, &(0x7f00000019c0)=""/4096, 0x1000, 0xf76}, 0x120) r5 = perf_event_open(&(0x7f0000000dc0)={0x7, 0x70, 0x2, 0x7, 0x1, 0x7ff, 0x0, 0x9, 0x1, 0xc, 0x5, 0xffffffffffff7fff, 0xffffffffffffb8f4, 0xe8a, 0xffffffff7fffffff, 0x2, 0x7, 0x40da, 0xffffffffffffffff, 0x7, 0x0, 0x7, 0xfffffffffffffffa, 0x13, 0x7f, 0x80000001, 0x2, 0x100000000, 0x2d, 0x1ff, 0x80000001, 0x7ee, 0x7, 0x2, 0xfffffffffffffffe, 0x4, 0x0, 0x100000000, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000d80), 0x2}, 0x8264, 0x5, 0x5, 0x1, 0x2, 0x1, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r4) [ 260.364624] FAULT_INJECTION: forcing a failure. [ 260.364624] name failslab, interval 1, probability 0, space 0, times 0 [ 260.375921] CPU: 1 PID: 5003 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 260.383113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.392463] Call Trace: [ 260.395065] dump_stack+0x194/0x24d [ 260.398706] ? arch_local_irq_restore+0x53/0x53 [ 260.403387] ? __save_stack_trace+0x7e/0xd0 [ 260.407729] should_fail+0x8c0/0xa40 [ 260.411454] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.416562] ? kasan_kmalloc+0xad/0xe0 [ 260.420449] ? kmem_cache_alloc_trace+0x136/0x740 [ 260.425287] ? __memcg_init_list_lru_node+0x169/0x270 [ 260.430471] ? __list_lru_init+0x544/0x750 [ 260.434700] ? sget_userns+0x691/0xe40 [ 260.438587] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 260.443338] ? do_mount+0xea4/0x2bb0 [ 260.447046] ? SyS_mount+0xab/0x120 [ 260.450665] ? do_syscall_64+0x281/0x940 [ 260.454715] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.460072] ? find_held_lock+0x35/0x1d0 [ 260.464120] ? __lock_is_held+0xb6/0x140 [ 260.468170] ? check_same_owner+0x320/0x320 [ 260.472470] ? rcu_note_context_switch+0x710/0x710 [ 260.477387] should_failslab+0xec/0x120 [ 260.481347] kmem_cache_alloc_trace+0x4b/0x740 [ 260.485913] ? __kmalloc_node+0x33/0x70 [ 260.489876] ? __kmalloc_node+0x33/0x70 [ 260.493847] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.498872] __memcg_init_list_lru_node+0x169/0x270 [ 260.503889] ? list_lru_add+0x7c0/0x7c0 [ 260.507860] ? __kmalloc_node+0x47/0x70 [ 260.511847] __list_lru_init+0x544/0x750 [ 260.515920] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 260.521793] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 260.526785] ? __lockdep_init_map+0xe4/0x650 [ 260.531183] ? lockdep_init_map+0x9/0x10 [ 260.535243] sget_userns+0x691/0xe40 [ 260.538942] ? kernfs_sop_show_path+0x190/0x190 [ 260.543596] ? kernfs_sop_show_options+0x180/0x180 [ 260.548504] ? destroy_unused_super.part.6+0xd0/0xd0 [ 260.553625] ? check_same_owner+0x320/0x320 [ 260.557944] ? rcu_pm_notify+0xc0/0xc0 [ 260.561850] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.566854] ? kmem_cache_alloc_trace+0x459/0x740 [ 260.571687] ? lock_downgrade+0x980/0x980 [ 260.575853] kernfs_mount_ns+0x13d/0x8b0 [ 260.579920] ? kernfs_super_ns+0x70/0x70 [ 260.583979] sysfs_mount+0xc2/0x1c0 [ 260.587589] ? sysfs_kill_sb+0x40/0x40 [ 260.591468] ? alloc_pages_current+0xbe/0x1e0 [ 260.595949] ? security_sb_copy_data+0x81/0xb0 [ 260.600512] mount_fs+0x66/0x2d0 [ 260.603860] vfs_kern_mount.part.26+0xc6/0x4a0 [ 260.608430] ? may_umount+0xa0/0xa0 [ 260.612049] ? _raw_read_unlock+0x22/0x30 [ 260.616188] ? __get_fs_type+0x8a/0xc0 [ 260.620081] do_mount+0xea4/0x2bb0 [ 260.623617] ? copy_mount_string+0x40/0x40 [ 260.627827] ? rcu_pm_notify+0xc0/0xc0 [ 260.631715] ? copy_mount_options+0x5f/0x2e0 [ 260.636106] ? rcu_read_lock_sched_held+0x108/0x120 [ 260.641104] ? kmem_cache_alloc_trace+0x459/0x740 [ 260.645940] ? kasan_check_write+0x14/0x20 [ 260.650158] ? _copy_from_user+0x99/0x110 [ 260.654285] ? copy_mount_options+0x1f7/0x2e0 [ 260.658765] SyS_mount+0xab/0x120 [ 260.662195] ? copy_mnt_ns+0xb30/0xb30 [ 260.666072] do_syscall_64+0x281/0x940 [ 260.669942] ? __do_page_fault+0xc90/0xc90 [ 260.674157] ? _raw_spin_unlock_irq+0x27/0x70 [ 260.678635] ? finish_task_switch+0x1c1/0x7e0 [ 260.683122] ? syscall_return_slowpath+0x550/0x550 [ 260.688040] ? syscall_return_slowpath+0x2ac/0x550 [ 260.692965] ? prepare_exit_to_usermode+0x350/0x350 [ 260.697966] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 260.703326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 260.708157] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 10:21:06 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 260.713318] RIP: 0033:0x4548b9 [ 260.716486] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 260.724184] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 260.731442] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 260.738695] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 260.745941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 260.753451] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/29 10:21:06 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:06 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:06 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000d40)) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000dc0)={r1}) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d80)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00') ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0x7) 2018/03/29 10:21:06 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578", 0x4e}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:06 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xd, 0x100000000, 0x677, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x2c) recvmsg$kcm(r2, &(0x7f00000081c0)={&(0x7f0000007d00)=@can={0x0, 0x0}, 0x80, &(0x7f0000008080)=[{&(0x7f0000007d80)=""/175, 0xaf}, {&(0x7f0000007e40)=""/93, 0x5d}, {&(0x7f0000007ec0)=""/193, 0xc1}, {&(0x7f0000007fc0)=""/143, 0x8f}], 0x4, &(0x7f00000080c0)=""/223, 0xdf, 0x2}, 0x40) bpf$PROG_LOAD(0x5, &(0x7f0000008200)={0x8, 0x6, &(0x7f0000000140)=@raw=[@jmp={0x5, 0x8ed0, 0x8, 0xa, 0xa, 0xffffffc0, 0xffffffffffffffff}, @map={0x18, 0x0, 0x1, 0x0, r3}, @exit={0x95}], &(0x7f00000001c0)='GPL\x00', 0x1, 0x9d, &(0x7f0000000380)=""/157, 0x40f00, 0x1, [], r4}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='..'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) r6 = perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x800, 0x2, 0x8, 0x8000000000000000, 0x0, 0x3, 0x80440, 0x8, 0x4, 0x37, 0x100000001, 0x0, 0x8, 0x4, 0x7, 0x800, 0x9, 0x3ce, 0xffff, 0x800, 0x2, 0xffff, 0x5, 0x1ff, 0x100000001, 0x4, 0x2, 0x10001, 0x7, 0x81, 0x3f, 0x800, 0x0, 0x100000001, 0xffffffffffffff81, 0x2, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x9}, 0x200, 0xbe, 0x80000000, 0x3, 0x9, 0xfffffffffffffffd, 0x7}, 0x0, 0xe, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000200)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) 2018/03/29 10:21:06 executing program 2 (fault-call:1 fault-nth:15): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:06 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000000)) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:06 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x0, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 260.873545] FAULT_INJECTION: forcing a failure. [ 260.873545] name failslab, interval 1, probability 0, space 0, times 0 [ 260.884815] CPU: 0 PID: 5053 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 260.892003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.901348] Call Trace: [ 260.903937] dump_stack+0x194/0x24d [ 260.907557] ? arch_local_irq_restore+0x53/0x53 [ 260.912211] ? __save_stack_trace+0x7e/0xd0 [ 260.916538] should_fail+0x8c0/0xa40 [ 260.920242] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 260.925326] ? kasan_kmalloc+0xad/0xe0 [ 260.929191] ? kmem_cache_alloc_trace+0x136/0x740 [ 260.934018] ? __memcg_init_list_lru_node+0x169/0x270 [ 260.939188] ? __list_lru_init+0x544/0x750 [ 260.943397] ? sget_userns+0x691/0xe40 [ 260.947270] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 260.951999] ? do_mount+0xea4/0x2bb0 [ 260.955697] ? SyS_mount+0xab/0x120 [ 260.959303] ? do_syscall_64+0x281/0x940 [ 260.963341] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 260.968700] ? find_held_lock+0x35/0x1d0 [ 260.972756] ? __lock_is_held+0xb6/0x140 [ 260.976833] ? check_same_owner+0x320/0x320 [ 260.981141] ? rcu_note_context_switch+0x710/0x710 [ 260.986073] should_failslab+0xec/0x120 [ 260.990033] kmem_cache_alloc_trace+0x4b/0x740 [ 260.994595] ? __kmalloc_node+0x33/0x70 [ 260.998553] ? __kmalloc_node+0x33/0x70 [ 261.002509] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.007519] __memcg_init_list_lru_node+0x169/0x270 [ 261.012526] ? list_lru_add+0x7c0/0x7c0 [ 261.016483] ? __kmalloc_node+0x47/0x70 [ 261.020453] __list_lru_init+0x544/0x750 [ 261.024505] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 261.030373] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 261.035372] ? __lockdep_init_map+0xe4/0x650 [ 261.039768] ? lockdep_init_map+0x9/0x10 [ 261.043819] sget_userns+0x691/0xe40 [ 261.047533] ? kernfs_sop_show_path+0x190/0x190 [ 261.052192] ? kernfs_sop_show_options+0x180/0x180 [ 261.057107] ? destroy_unused_super.part.6+0xd0/0xd0 [ 261.062217] ? check_same_owner+0x320/0x320 [ 261.066521] ? rcu_pm_notify+0xc0/0xc0 [ 261.070410] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.075405] ? kmem_cache_alloc_trace+0x459/0x740 [ 261.080229] ? lock_downgrade+0x980/0x980 [ 261.084380] kernfs_mount_ns+0x13d/0x8b0 [ 261.088427] ? kernfs_super_ns+0x70/0x70 [ 261.092491] sysfs_mount+0xc2/0x1c0 [ 261.096101] ? sysfs_kill_sb+0x40/0x40 [ 261.099972] ? alloc_pages_current+0xbe/0x1e0 [ 261.104452] ? security_sb_copy_data+0x81/0xb0 [ 261.109025] mount_fs+0x66/0x2d0 [ 261.112386] vfs_kern_mount.part.26+0xc6/0x4a0 [ 261.116951] ? may_umount+0xa0/0xa0 [ 261.120560] ? _raw_read_unlock+0x22/0x30 [ 261.124684] ? __get_fs_type+0x8a/0xc0 [ 261.128568] do_mount+0xea4/0x2bb0 [ 261.132105] ? copy_mount_string+0x40/0x40 [ 261.136321] ? rcu_pm_notify+0xc0/0xc0 [ 261.140210] ? copy_mount_options+0x5f/0x2e0 [ 261.144595] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.149592] ? kmem_cache_alloc_trace+0x459/0x740 [ 261.154419] ? kasan_check_write+0x14/0x20 [ 261.158632] ? _copy_from_user+0x99/0x110 [ 261.162789] ? copy_mount_options+0x1f7/0x2e0 [ 261.167280] SyS_mount+0xab/0x120 [ 261.170714] ? copy_mnt_ns+0xb30/0xb30 [ 261.174585] do_syscall_64+0x281/0x940 [ 261.178455] ? __do_page_fault+0xc90/0xc90 [ 261.182666] ? _raw_spin_unlock_irq+0x27/0x70 [ 261.187145] ? finish_task_switch+0x1c1/0x7e0 [ 261.191620] ? syscall_return_slowpath+0x550/0x550 [ 261.196530] ? syscall_return_slowpath+0x2ac/0x550 [ 261.201444] ? prepare_exit_to_usermode+0x350/0x350 [ 261.206439] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 261.211795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.216637] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.221803] RIP: 0033:0x4548b9 [ 261.224973] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.232662] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 261.239907] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 261.247154] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 261.254402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 261.261648] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/29 10:21:07 executing program 2 (fault-call:1 fault-nth:16): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:07 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r2, &(0x7f00000004c0)="7369756c7c7e2846583a27616d9d3e125fa71b18cbb0cefa9fbe3c84fa73e645f45bec30c57863242749939eac285ad471479fe38e380f5501b615a934805725c56dddd6cce09ffd929837eb3d515971819f5dceff6e0fd997a18506aa86f883926931ee25d7137aaa0daf4a7a24c2800ae3803047bc73945970c3fd0133ab0c3874300b24aa79aa12b63b505490164033845ece920205c4ea347f7833cf6fa9b11c65f2c687b0c7bcb62961e7bf881add9cb0376fac92460608e73b213b44f800baa99f6d06f674b5393a384ca03668eb", &(0x7f0000000000)=""/85}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:07 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x0, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:07 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578", 0x4e}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:07 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x0, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:07 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 261.364938] FAULT_INJECTION: forcing a failure. [ 261.364938] name failslab, interval 1, probability 0, space 0, times 0 [ 261.376326] CPU: 0 PID: 5076 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 261.383514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.392864] Call Trace: [ 261.395452] dump_stack+0x194/0x24d [ 261.399078] ? arch_local_irq_restore+0x53/0x53 [ 261.403731] ? __save_stack_trace+0x7e/0xd0 [ 261.408061] should_fail+0x8c0/0xa40 [ 261.411764] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 261.416846] ? kasan_kmalloc+0xad/0xe0 [ 261.420709] ? kmem_cache_alloc_trace+0x136/0x740 [ 261.425531] ? __memcg_init_list_lru_node+0x169/0x270 [ 261.430699] ? __list_lru_init+0x544/0x750 [ 261.434911] ? sget_userns+0x691/0xe40 [ 261.438784] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 261.443517] ? do_mount+0xea4/0x2bb0 [ 261.447205] ? SyS_mount+0xab/0x120 [ 261.450812] ? do_syscall_64+0x281/0x940 [ 261.454851] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.460208] ? find_held_lock+0x35/0x1d0 [ 261.464262] ? __lock_is_held+0xb6/0x140 [ 261.468333] ? check_same_owner+0x320/0x320 [ 261.472640] ? rcu_note_context_switch+0x710/0x710 [ 261.477567] should_failslab+0xec/0x120 [ 261.481525] kmem_cache_alloc_trace+0x4b/0x740 [ 261.486085] ? __kmalloc_node+0x33/0x70 [ 261.490044] ? __kmalloc_node+0x33/0x70 [ 261.494005] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.499021] __memcg_init_list_lru_node+0x169/0x270 [ 261.504040] ? list_lru_add+0x7c0/0x7c0 [ 261.508007] ? __kmalloc_node+0x47/0x70 [ 261.511984] __list_lru_init+0x544/0x750 [ 261.516044] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 261.521918] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 261.526918] ? __lockdep_init_map+0xe4/0x650 [ 261.531312] ? lockdep_init_map+0x9/0x10 [ 261.535359] sget_userns+0x691/0xe40 [ 261.539049] ? kernfs_sop_show_path+0x190/0x190 [ 261.543710] ? kernfs_sop_show_options+0x180/0x180 [ 261.548624] ? destroy_unused_super.part.6+0xd0/0xd0 [ 261.553733] ? check_same_owner+0x320/0x320 [ 261.558042] ? rcu_pm_notify+0xc0/0xc0 [ 261.561936] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.566932] ? kmem_cache_alloc_trace+0x459/0x740 [ 261.571753] ? lock_downgrade+0x980/0x980 [ 261.575905] kernfs_mount_ns+0x13d/0x8b0 [ 261.579956] ? kernfs_super_ns+0x70/0x70 [ 261.584027] sysfs_mount+0xc2/0x1c0 [ 261.587639] ? sysfs_kill_sb+0x40/0x40 [ 261.591507] ? alloc_pages_current+0xbe/0x1e0 [ 261.595990] ? security_sb_copy_data+0x81/0xb0 [ 261.600560] mount_fs+0x66/0x2d0 [ 261.603916] vfs_kern_mount.part.26+0xc6/0x4a0 [ 261.608483] ? may_umount+0xa0/0xa0 [ 261.612091] ? _raw_read_unlock+0x22/0x30 [ 261.616218] ? __get_fs_type+0x8a/0xc0 [ 261.620103] do_mount+0xea4/0x2bb0 [ 261.623641] ? copy_mount_string+0x40/0x40 [ 261.627857] ? rcu_pm_notify+0xc0/0xc0 [ 261.631744] ? copy_mount_options+0x5f/0x2e0 [ 261.636129] ? rcu_read_lock_sched_held+0x108/0x120 [ 261.641124] ? kmem_cache_alloc_trace+0x459/0x740 [ 261.645953] ? kasan_check_write+0x14/0x20 [ 261.650169] ? _copy_from_user+0x99/0x110 [ 261.654306] ? copy_mount_options+0x1f7/0x2e0 [ 261.658794] SyS_mount+0xab/0x120 [ 261.662225] ? copy_mnt_ns+0xb30/0xb30 [ 261.666101] do_syscall_64+0x281/0x940 [ 261.669965] ? __do_page_fault+0xc90/0xc90 [ 261.674181] ? _raw_spin_unlock_irq+0x27/0x70 [ 261.678655] ? finish_task_switch+0x1c1/0x7e0 [ 261.683135] ? syscall_return_slowpath+0x550/0x550 [ 261.688051] ? syscall_return_slowpath+0x2ac/0x550 [ 261.692962] ? prepare_exit_to_usermode+0x350/0x350 [ 261.697966] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 261.703323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 261.708159] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 261.713330] RIP: 0033:0x4548b9 2018/03/29 10:21:07 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000001c0)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000540)) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r1, &(0x7f00000003c0), &(0x7f0000000400)=""/59}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r1, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x6, 0x16, 0x0, 0x0, 0x8, 0x1000, 0x2, 0x2, 0x746, 0x3ff, 0x100000000, 0x2, 0x0, 0x7f, 0x6bd, 0x6, 0xbd8, 0x0, 0xffffffffffffff01, 0xf8, 0x7, 0x5, 0x2, 0x8, 0xfffffffffffffff7, 0x6, 0x0, 0x6, 0xffffffff, 0x65, 0xa, 0x100, 0x8, 0x8e3, 0x49c, 0x0, 0x80, 0x2, @perf_bp={&(0x7f0000000000), 0xe}, 0x11000, 0x1f, 0x300000000000, 0x7, 0x5, 0x1, 0x9}, 0x0, 0x9, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000140)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r1, 0xa27d}, 0x2c) [ 261.716498] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 261.724188] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 261.731435] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 261.738681] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 261.745929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 261.753176] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/29 10:21:07 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000001140)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) sendmsg$kcm(r1, &(0x7f0000001100)={&(0x7f0000000d40)=@in6={0xa, 0x4e22, 0x9, @mcast2={0xff, 0x2, [], 0x1}, 0x8000}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000dc0)="5444729c22a78f22a1ee115c23791f20430ad3520ec8331e2e290f072076fecebaeb5aa45830d440c330e0171049a498fb7662d0f51da872352e0c95c78bfc0d27bcf6f40bdf767b22a22ab9fed5425673", 0x51}, {&(0x7f0000000e40)="579c0623a1f2f16a65d0651c57163a6d243e9eaea56a587a9ad410128f5f8e0669622a2248fd856530f4b13b817af6e8eafe0cbe34b6826789eaf42d7013a743ef121a5eb8e8feed55e44df66a13fe5003d58f68b593fc8bd0a6d6e520bc7491077000a3248aeb47fac275496f3872622d39715d243af35a24f817df0559395ff9d4f7a84c881ee0bb92335e6792c78e76ebd1e32c9c037c044cb809f0d9e4124045ae85dae2a7605b96742cc4557bd3c1173ab918d0c5aa84be0da979800f3d85908d0224698dd3c85dfdcc9e0de49fc3362a492029df0ddbc5e3ff", 0xdc}, {&(0x7f0000000f40)="823782fd00f8e884dd6de910ad44cb9f4b0ceffc0757f633a345ece1f44ef79df76af0a52e279c3ab31063783bf162ad623f1196ef16", 0x36}, {&(0x7f0000000f80)="937a49debb757e847555dba1235eadba13254908944c674a68d787aed4f38f82f2", 0x21}, {&(0x7f0000000fc0)="9ca331ba5cc06a1e235f6bd900e233c0e1e6be53f218e5578aa144e6d62e5ec274538a437f38f40e6c88a961e8c3ad926cee5142d0a8864d6fc8e07b56383ddbf44345b5992899abfb0a5fb626481f738cb0d44734e0b74909321a586fb49a60cab783c315c64afe21bc0b7e874e5206ccd3a6e4c48d1938e6ece3d3ab2a0f0ede52ca596c5aebe4c3d4b42f6a388f55c60eab559dfce4364487185a83dd2c", 0x9f}], 0x5, 0x0, 0x0, 0x4085}, 0x8000) recvmsg$kcm(r1, &(0x7f0000003f80)={&(0x7f0000002d80)=@hci={0x0, 0x0}, 0x80, &(0x7f0000003f40)=[{&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000003e00)=""/177, 0xb1}, {&(0x7f0000003ec0)=""/99, 0x63}], 0x3, 0x0, 0x0, 0x8}, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000003fc0)={0x5, 0x7, &(0x7f0000001140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x49}, [@ldst={0x3, 0x3, 0x0, 0x6, 0x4, 0xffffffff, 0x15a523b4fbbd884c}, @ldst={0x3, 0x3, 0x2, 0xf, 0x8, 0xffffffff, 0xffffffffffffffff}], {0x95}}, &(0x7f0000001180)='syzkaller\x00', 0x4, 0x2b, &(0x7f00000011c0)=""/43, 0x40f00, 0x1, [], r2}, 0x48) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:08 executing program 2 (fault-call:1 fault-nth:17): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:08 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:08 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:08 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x100000000002, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:08 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) sendmsg$kcm(r2, &(0x7f0000000380)={&(0x7f0000000000)=@un=@abs={0x0, 0x0, 0x4e22}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)="a224d78196506434891b", 0xa}, {&(0x7f0000000c80)="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", 0x1000}, {&(0x7f00000001c0)="3092727d20866b51a8f02b6bd1cbffd882f1fca3b127437b15a4032e9078f22fba917be972a9d375435563e5e914a4f129d857ea25e36741c6e67335796b3e6a5c1ae6da92c12d8e48ee625ec38cb581cef437a3e093bf0a70f3bbd8bd457160bc36ba3820", 0x65}, {&(0x7f0000002280)="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", 0x1000}], 0x4, &(0x7f00000004c0)=[{0xd0, 0x113, 0x3, "33c5e5b83204046cbcbb831a0cacd69eba13b192ea46c6625d28d67fbe2cf7b13943b6b5bcae67ac546405aebcd2156f8480acdf03ab50b0a4057df24888a60aea7cc7b56b5c5ba89d8a846aeaadc81988004204146b2a6ab1c0614daeec343b86e0a5bb12f469a4ec82499d0b01c8e1d0365ce9b17f5cd228018d0c523723fb52ff329abaf3971dfb8056cfb9a3f8588ea3e40edc5f4fb7be87be98b38d8a80a26fc691671d5b8eee762561f3f0b7d89b49a9b39ae1c3b0321a3052d3c04c"}], 0xd0, 0x10}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:08 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x0, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:08 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95a", 0x54}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:08 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={r2, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r3, 0x71, 0x10}, 0xc) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x82035) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 262.029273] FAULT_INJECTION: forcing a failure. [ 262.029273] name failslab, interval 1, probability 0, space 0, times 0 [ 262.040571] CPU: 0 PID: 5137 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 262.047761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.057108] Call Trace: [ 262.059688] dump_stack+0x194/0x24d [ 262.063305] ? arch_local_irq_restore+0x53/0x53 [ 262.067956] ? __save_stack_trace+0x7e/0xd0 [ 262.072283] should_fail+0x8c0/0xa40 [ 262.075989] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.081075] ? kasan_kmalloc+0xad/0xe0 [ 262.084940] ? kmem_cache_alloc_trace+0x136/0x740 [ 262.089762] ? __memcg_init_list_lru_node+0x169/0x270 [ 262.094930] ? __list_lru_init+0x544/0x750 [ 262.099140] ? sget_userns+0x691/0xe40 [ 262.103012] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 262.107752] ? do_mount+0xea4/0x2bb0 [ 262.111442] ? SyS_mount+0xab/0x120 [ 262.115046] ? do_syscall_64+0x281/0x940 [ 262.119083] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.124438] ? find_held_lock+0x35/0x1d0 [ 262.128494] ? __lock_is_held+0xb6/0x140 [ 262.132564] ? check_same_owner+0x320/0x320 [ 262.136890] ? rcu_note_context_switch+0x710/0x710 [ 262.141818] should_failslab+0xec/0x120 [ 262.145774] kmem_cache_alloc_trace+0x4b/0x740 [ 262.150336] ? __kmalloc_node+0x33/0x70 [ 262.154287] ? __kmalloc_node+0x33/0x70 [ 262.158244] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.163256] __memcg_init_list_lru_node+0x169/0x270 [ 262.168263] ? list_lru_add+0x7c0/0x7c0 [ 262.172221] ? __kmalloc_node+0x47/0x70 [ 262.176195] __list_lru_init+0x544/0x750 [ 262.180248] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 262.186121] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 262.191119] ? __lockdep_init_map+0xe4/0x650 [ 262.195514] ? lockdep_init_map+0x9/0x10 [ 262.199562] sget_userns+0x691/0xe40 [ 262.203251] ? kernfs_sop_show_path+0x190/0x190 [ 262.207911] ? kernfs_sop_show_options+0x180/0x180 [ 262.212828] ? destroy_unused_super.part.6+0xd0/0xd0 [ 262.217937] ? check_same_owner+0x320/0x320 [ 262.222241] ? retint_kernel+0x10/0x10 [ 262.226111] ? rcu_pm_notify+0xc0/0xc0 [ 262.230003] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.235006] ? kmem_cache_alloc_trace+0x459/0x740 [ 262.239831] ? lock_downgrade+0x980/0x980 [ 262.243983] kernfs_mount_ns+0x13d/0x8b0 [ 262.248038] ? kernfs_super_ns+0x70/0x70 [ 262.252114] sysfs_mount+0xc2/0x1c0 [ 262.255726] ? sysfs_kill_sb+0x40/0x40 [ 262.259596] ? alloc_pages_current+0xbe/0x1e0 [ 262.264074] ? security_sb_copy_data+0x81/0xb0 [ 262.268644] mount_fs+0x66/0x2d0 [ 262.272000] vfs_kern_mount.part.26+0xc6/0x4a0 [ 262.276576] ? may_umount+0xa0/0xa0 [ 262.280184] ? _raw_read_unlock+0x22/0x30 [ 262.284313] ? __get_fs_type+0x8a/0xc0 [ 262.288194] do_mount+0xea4/0x2bb0 [ 262.291733] ? copy_mount_string+0x40/0x40 [ 262.295948] ? rcu_pm_notify+0xc0/0xc0 [ 262.299834] ? copy_mount_options+0x5f/0x2e0 [ 262.304234] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.309244] ? kmem_cache_alloc_trace+0x459/0x740 [ 262.314073] ? kasan_check_write+0x14/0x20 [ 262.318286] ? _copy_from_user+0x99/0x110 [ 262.322427] ? copy_mount_options+0x1f7/0x2e0 [ 262.326915] SyS_mount+0xab/0x120 [ 262.330347] ? copy_mnt_ns+0xb30/0xb30 [ 262.334218] do_syscall_64+0x281/0x940 [ 262.338082] ? __do_page_fault+0xc90/0xc90 [ 262.342291] ? _raw_spin_unlock_irq+0x27/0x70 [ 262.346766] ? finish_task_switch+0x1c1/0x7e0 [ 262.351243] ? syscall_return_slowpath+0x550/0x550 [ 262.356155] ? syscall_return_slowpath+0x2ac/0x550 [ 262.361067] ? prepare_exit_to_usermode+0x350/0x350 [ 262.366065] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 262.371419] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/29 10:21:08 executing program 2 (fault-call:1 fault-nth:18): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) [ 262.376256] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.381425] RIP: 0033:0x4548b9 [ 262.384594] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 262.392284] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 262.399533] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 262.406783] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 262.414032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 262.421279] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/29 10:21:08 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x762c24a05dfaf44, &(0x7f0000000040)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) socketpair$inet(0x2, 0x4, 0x2, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:08 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:08 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:08 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95a", 0x54}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:08 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) socketpair(0x9, 0x80000, 0x4bfbd4c2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) [ 262.534145] FAULT_INJECTION: forcing a failure. [ 262.534145] name failslab, interval 1, probability 0, space 0, times 0 [ 262.545426] CPU: 0 PID: 5165 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 262.552612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.561970] Call Trace: [ 262.564561] dump_stack+0x194/0x24d [ 262.568210] ? arch_local_irq_restore+0x53/0x53 [ 262.572885] ? __save_stack_trace+0x7e/0xd0 [ 262.577221] should_fail+0x8c0/0xa40 [ 262.580943] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 262.586051] ? kasan_kmalloc+0xad/0xe0 [ 262.589947] ? kmem_cache_alloc_trace+0x136/0x740 [ 262.594779] ? __memcg_init_list_lru_node+0x169/0x270 [ 262.599948] ? __list_lru_init+0x544/0x750 [ 262.604157] ? sget_userns+0x691/0xe40 [ 262.608028] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 262.612773] ? do_mount+0xea4/0x2bb0 [ 262.616477] ? SyS_mount+0xab/0x120 [ 262.620096] ? do_syscall_64+0x281/0x940 [ 262.624141] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.629508] ? find_held_lock+0x35/0x1d0 [ 262.633576] ? __lock_is_held+0xb6/0x140 [ 262.637635] ? check_same_owner+0x320/0x320 [ 262.641951] ? rcu_note_context_switch+0x710/0x710 [ 262.646884] should_failslab+0xec/0x120 [ 262.650846] kmem_cache_alloc_trace+0x4b/0x740 [ 262.655409] ? __kmalloc_node+0x33/0x70 [ 262.659379] __memcg_init_list_lru_node+0x169/0x270 [ 262.664377] ? list_lru_add+0x7c0/0x7c0 [ 262.668326] ? __kmalloc_node+0x47/0x70 [ 262.672289] __list_lru_init+0x544/0x750 [ 262.676968] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 262.682839] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 262.687844] ? __lockdep_init_map+0xe4/0x650 [ 262.692251] ? lockdep_init_map+0x9/0x10 [ 262.696300] sget_userns+0x691/0xe40 [ 262.699988] ? kernfs_sop_show_path+0x190/0x190 [ 262.704647] ? kernfs_sop_show_options+0x180/0x180 [ 262.709569] ? destroy_unused_super.part.6+0xd0/0xd0 [ 262.714662] ? check_same_owner+0x320/0x320 [ 262.718963] ? rcu_pm_notify+0xc0/0xc0 [ 262.722851] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.727850] ? kmem_cache_alloc_trace+0x459/0x740 [ 262.732675] ? lock_downgrade+0x980/0x980 [ 262.736815] kernfs_mount_ns+0x13d/0x8b0 [ 262.740852] ? kernfs_super_ns+0x70/0x70 [ 262.744896] sysfs_mount+0xc2/0x1c0 [ 262.748497] ? sysfs_kill_sb+0x40/0x40 [ 262.752359] ? alloc_pages_current+0xbe/0x1e0 [ 262.756832] ? security_sb_copy_data+0x81/0xb0 [ 262.761390] mount_fs+0x66/0x2d0 [ 262.764737] vfs_kern_mount.part.26+0xc6/0x4a0 [ 262.769303] ? may_umount+0xa0/0xa0 [ 262.772923] ? _raw_read_unlock+0x22/0x30 [ 262.777056] ? __get_fs_type+0x8a/0xc0 [ 262.780927] do_mount+0xea4/0x2bb0 [ 262.784447] ? copy_mount_string+0x40/0x40 [ 262.788657] ? rcu_pm_notify+0xc0/0xc0 [ 262.792529] ? copy_mount_options+0x5f/0x2e0 [ 262.796924] ? rcu_read_lock_sched_held+0x108/0x120 [ 262.801920] ? kmem_cache_alloc_trace+0x459/0x740 [ 262.806738] ? kasan_check_write+0x14/0x20 [ 262.810952] ? _copy_from_user+0x99/0x110 [ 262.815080] ? copy_mount_options+0x1f7/0x2e0 [ 262.819554] SyS_mount+0xab/0x120 [ 262.822982] ? copy_mnt_ns+0xb30/0xb30 [ 262.826847] do_syscall_64+0x281/0x940 [ 262.830707] ? __do_page_fault+0xc90/0xc90 [ 262.834913] ? _raw_spin_unlock_irq+0x27/0x70 [ 262.839382] ? finish_task_switch+0x1c1/0x7e0 [ 262.843860] ? syscall_return_slowpath+0x550/0x550 [ 262.848773] ? syscall_return_slowpath+0x2ac/0x550 [ 262.853678] ? prepare_exit_to_usermode+0x350/0x350 [ 262.858670] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 262.864026] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 262.868856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 262.874024] RIP: 0033:0x4548b9 [ 262.877197] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:21:09 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x0, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:09 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:09 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 262.884892] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 262.892145] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 262.899392] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 262.906636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 262.913881] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/29 10:21:09 executing program 2 (fault-call:1 fault-nth:19): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:09 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95a", 0x54}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:09 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:09 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)={0xa, 0x8000, 0x7, 0xffff, 0x0, r1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000dc0)={&(0x7f0000000d40)='./file0\x00', r4}, 0x10) 2018/03/29 10:21:09 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x0, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:09 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:09 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 263.074799] FAULT_INJECTION: forcing a failure. [ 263.074799] name failslab, interval 1, probability 0, space 0, times 0 [ 263.086094] CPU: 0 PID: 5215 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 263.093278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.102626] Call Trace: [ 263.105206] dump_stack+0x194/0x24d [ 263.108822] ? arch_local_irq_restore+0x53/0x53 [ 263.113470] ? __save_stack_trace+0x7e/0xd0 [ 263.117967] should_fail+0x8c0/0xa40 [ 263.121703] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.126787] ? kasan_kmalloc+0xad/0xe0 [ 263.130654] ? kmem_cache_alloc_trace+0x136/0x740 [ 263.135474] ? __memcg_init_list_lru_node+0x169/0x270 [ 263.140641] ? __list_lru_init+0x544/0x750 [ 263.144854] ? sget_userns+0x691/0xe40 [ 263.148739] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 263.153474] ? do_mount+0xea4/0x2bb0 [ 263.157162] ? SyS_mount+0xab/0x120 [ 263.160765] ? do_syscall_64+0x281/0x940 [ 263.164813] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.170171] ? find_held_lock+0x35/0x1d0 [ 263.174223] ? __lock_is_held+0xb6/0x140 [ 263.178292] ? check_same_owner+0x320/0x320 [ 263.182599] ? rcu_note_context_switch+0x710/0x710 [ 263.187530] should_failslab+0xec/0x120 [ 263.191485] kmem_cache_alloc_trace+0x4b/0x740 [ 263.196048] ? __kmalloc_node+0x33/0x70 [ 263.200004] ? __kmalloc_node+0x33/0x70 [ 263.203966] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.208973] __memcg_init_list_lru_node+0x169/0x270 [ 263.213978] ? list_lru_add+0x7c0/0x7c0 [ 263.217935] ? __kmalloc_node+0x47/0x70 [ 263.221904] __list_lru_init+0x544/0x750 [ 263.225956] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 263.231823] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 263.236821] ? __lockdep_init_map+0xe4/0x650 [ 263.241217] ? lockdep_init_map+0x9/0x10 [ 263.245269] sget_userns+0x691/0xe40 [ 263.248962] ? kernfs_sop_show_path+0x190/0x190 [ 263.253623] ? kernfs_sop_show_options+0x180/0x180 [ 263.258539] ? destroy_unused_super.part.6+0xd0/0xd0 [ 263.263649] ? check_same_owner+0x320/0x320 [ 263.267953] ? rcu_pm_notify+0xc0/0xc0 [ 263.271846] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.276844] ? kmem_cache_alloc_trace+0x459/0x740 [ 263.281667] ? lock_downgrade+0x980/0x980 [ 263.285818] kernfs_mount_ns+0x13d/0x8b0 [ 263.289864] ? kernfs_super_ns+0x70/0x70 [ 263.293928] sysfs_mount+0xc2/0x1c0 [ 263.297535] ? sysfs_kill_sb+0x40/0x40 [ 263.301408] ? alloc_pages_current+0xbe/0x1e0 [ 263.305892] ? security_sb_copy_data+0x81/0xb0 [ 263.310466] mount_fs+0x66/0x2d0 [ 263.313827] vfs_kern_mount.part.26+0xc6/0x4a0 [ 263.318394] ? may_umount+0xa0/0xa0 [ 263.322003] ? _raw_read_unlock+0x22/0x30 [ 263.326139] ? __get_fs_type+0x8a/0xc0 [ 263.330025] do_mount+0xea4/0x2bb0 [ 263.333565] ? copy_mount_string+0x40/0x40 [ 263.337779] ? rcu_pm_notify+0xc0/0xc0 [ 263.341672] ? copy_mount_options+0x5f/0x2e0 [ 263.346057] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.351051] ? kmem_cache_alloc_trace+0x459/0x740 [ 263.355879] ? kasan_check_write+0x14/0x20 [ 263.360096] ? _copy_from_user+0x99/0x110 [ 263.364235] ? copy_mount_options+0x1f7/0x2e0 [ 263.368722] SyS_mount+0xab/0x120 [ 263.372153] ? copy_mnt_ns+0xb30/0xb30 [ 263.376030] do_syscall_64+0x281/0x940 [ 263.379899] ? __do_page_fault+0xc90/0xc90 [ 263.384110] ? _raw_spin_unlock_irq+0x27/0x70 [ 263.388587] ? finish_task_switch+0x1c1/0x7e0 [ 263.393064] ? syscall_return_slowpath+0x550/0x550 [ 263.397973] ? syscall_return_slowpath+0x2ac/0x550 [ 263.402882] ? prepare_exit_to_usermode+0x350/0x350 [ 263.407878] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 263.413232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.418069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.423234] RIP: 0033:0x4548b9 2018/03/29 10:21:09 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) recvmsg(r1, &(0x7f0000000400)={&(0x7f0000000000)=@can, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000000080)}, {&(0x7f00000004c0)=""/221, 0xdd}, {&(0x7f0000000140)=""/6, 0x6}, {&(0x7f00000005c0)=""/213, 0xd5}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f0000000380)=""/113, 0x71}, {&(0x7f00000006c0)=""/87, 0x57}, {&(0x7f0000000740)=""/71, 0x47}], 0x9, 0x0, 0x0, 0x5}, 0x12020) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000000080)}, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 263.426399] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 263.434087] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 263.441332] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 263.448599] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 263.455851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 263.463121] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/29 10:21:09 executing program 2 (fault-call:1 fault-nth:20): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:09 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762", 0x57}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:09 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:09 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xfffffff8}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) mkdir(&(0x7f0000000000)='..', 0x4) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x80007, 0x2, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 263.543808] FAULT_INJECTION: forcing a failure. [ 263.543808] name failslab, interval 1, probability 0, space 0, times 0 [ 263.555174] CPU: 1 PID: 5244 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 263.562362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.571715] Call Trace: [ 263.574312] dump_stack+0x194/0x24d [ 263.577950] ? arch_local_irq_restore+0x53/0x53 [ 263.582623] ? __save_stack_trace+0x7e/0xd0 [ 263.586967] should_fail+0x8c0/0xa40 [ 263.590691] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 263.595795] ? kasan_kmalloc+0xad/0xe0 [ 263.599682] ? kmem_cache_alloc_trace+0x136/0x740 [ 263.604526] ? __memcg_init_list_lru_node+0x169/0x270 [ 263.609714] ? __list_lru_init+0x544/0x750 [ 263.613944] ? sget_userns+0x691/0xe40 [ 263.617838] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 263.622593] ? do_mount+0xea4/0x2bb0 [ 263.626300] ? SyS_mount+0xab/0x120 [ 263.629918] ? do_syscall_64+0x281/0x940 [ 263.633970] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.639340] ? find_held_lock+0x35/0x1d0 2018/03/29 10:21:09 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x1, 0x1ff, 0x44, 0x5, 0x0, 0xc8b, 0x26002, 0x8, 0x10000, 0x401, 0x3f, 0x1, 0x8, 0x4, 0x1, 0x8, 0x2c, 0x6, 0x3, 0x2, 0x5, 0x40, 0x3f, 0x81, 0x10ce, 0xfff, 0x6, 0x9, 0x1, 0x7ff, 0x3, 0x5, 0x0, 0x1bae, 0xffffffff80000001, 0x45a, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000040), 0xd}, 0xb490, 0x2, 0x800, 0x3, 0x2, 0xac45, 0x400}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r1}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1, 0x6, 0x6, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0xfffffffffffffffd, 0xffffffffffffffff, 0xa27d}, 0x2c) getpid() ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000000)={r5}) [ 263.643407] ? __lock_is_held+0xb6/0x140 [ 263.647492] ? check_same_owner+0x320/0x320 [ 263.651820] ? rcu_note_context_switch+0x710/0x710 [ 263.656767] should_failslab+0xec/0x120 [ 263.660743] kmem_cache_alloc_trace+0x4b/0x740 [ 263.665322] ? __kmalloc_node+0x33/0x70 [ 263.669289] ? __kmalloc_node+0x33/0x70 [ 263.673263] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.678290] __memcg_init_list_lru_node+0x169/0x270 [ 263.683316] ? list_lru_add+0x7c0/0x7c0 [ 263.687285] ? __kmalloc_node+0x47/0x70 [ 263.691274] __list_lru_init+0x544/0x750 [ 263.695345] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 263.701236] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 263.706254] ? __lockdep_init_map+0xe4/0x650 [ 263.710756] ? lockdep_init_map+0x9/0x10 [ 263.714807] sget_userns+0x691/0xe40 [ 263.718517] ? kernfs_sop_show_path+0x190/0x190 [ 263.723195] ? kernfs_sop_show_options+0x180/0x180 [ 263.728115] ? destroy_unused_super.part.6+0xd0/0xd0 [ 263.733205] ? check_same_owner+0x320/0x320 [ 263.737508] ? rcu_pm_notify+0xc0/0xc0 [ 263.741402] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.746407] ? kmem_cache_alloc_trace+0x459/0x740 [ 263.751240] ? lock_downgrade+0x980/0x980 [ 263.755389] kernfs_mount_ns+0x13d/0x8b0 [ 263.759435] ? kernfs_super_ns+0x70/0x70 [ 263.763509] sysfs_mount+0xc2/0x1c0 [ 263.767131] ? sysfs_kill_sb+0x40/0x40 [ 263.771005] ? alloc_pages_current+0xbe/0x1e0 [ 263.775492] ? security_sb_copy_data+0x81/0xb0 [ 263.780069] mount_fs+0x66/0x2d0 [ 263.783435] vfs_kern_mount.part.26+0xc6/0x4a0 [ 263.788010] ? may_umount+0xa0/0xa0 [ 263.791623] ? _raw_read_unlock+0x22/0x30 [ 263.795751] ? __get_fs_type+0x8a/0xc0 [ 263.799627] do_mount+0xea4/0x2bb0 [ 263.803161] ? copy_mount_string+0x40/0x40 [ 263.807375] ? rcu_pm_notify+0xc0/0xc0 [ 263.811252] ? copy_mount_options+0x5f/0x2e0 [ 263.815647] ? rcu_read_lock_sched_held+0x108/0x120 [ 263.820651] ? kmem_cache_alloc_trace+0x459/0x740 [ 263.825478] ? kasan_check_write+0x14/0x20 [ 263.829698] ? copy_mount_options+0x1f7/0x2e0 [ 263.834174] SyS_mount+0xab/0x120 [ 263.837612] ? copy_mnt_ns+0xb30/0xb30 [ 263.841479] do_syscall_64+0x281/0x940 [ 263.845344] ? __do_page_fault+0xc90/0xc90 [ 263.849553] ? _raw_spin_unlock_irq+0x27/0x70 [ 263.854035] ? finish_task_switch+0x1c1/0x7e0 [ 263.858511] ? syscall_return_slowpath+0x550/0x550 [ 263.863417] ? syscall_return_slowpath+0x2ac/0x550 [ 263.868321] ? prepare_exit_to_usermode+0x350/0x350 [ 263.873314] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 263.878664] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 263.883491] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 263.888661] RIP: 0033:0x4548b9 2018/03/29 10:21:09 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) r1 = perf_event_open(&(0x7f0000000dc0)={0x0, 0x70, 0x8ff, 0x7f, 0xf43, 0x8, 0x0, 0x1200000000, 0x90000, 0x1, 0x8, 0x8, 0x10000, 0x94bf, 0x1, 0x0, 0x9, 0x0, 0x1, 0x1, 0xc30, 0xd07e, 0x148e, 0x3, 0x400, 0x2, 0x3, 0x4, 0x1, 0x5, 0x1, 0x5, 0x2, 0x2, 0x5, 0xcc, 0x20, 0x5, 0x0, 0xfff, 0x0, @perf_bp={&(0x7f0000000d80), 0x1}, 0x4000, 0x7, 0x3, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x7, 0xffffffffffffff9c, 0x3) socketpair(0xb, 0x801, 0x9, &(0x7f0000000e40)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r3 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r3, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000d40)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:10 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x0, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:10 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) mkdir(&(0x7f0000000000)='..', 0x80) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r2, &(0x7f0000000380)="cacc73156318d15fa74c65e6c44fc7b3f3e2568353028112b2e380c089651ffbb5b293e247a3d70c61530751dccf3524b69348f86e2f6fe81b982b23f1a290eb29b2ac70ea86c719c54af7d1af8c4709114fb2984f429dc39f90bb84f0c014eedf1e0ea65b96cafb6b59c7a0b5052459e704038288e637d52de07e26902488fe77ddfcfc1946bd789dbe932baf693bc8d3bceed697c10101"}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 263.891826] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 263.899506] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 263.906755] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 263.914009] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 263.921260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 263.928508] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/29 10:21:10 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x0, 0x5, &(0x7f0000000d40)) getpid() socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000d80)=0xffffffffffffffe1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:10 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:10 executing program 2 (fault-call:1 fault-nth:21): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:10 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:10 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:10 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762", 0x57}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:10 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x0, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:10 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) recvmsg(r1, &(0x7f0000000840)={&(0x7f0000000000)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000080)=""/47, 0x2f}, {&(0x7f0000000140)}, {&(0x7f00000001c0)=""/72, 0x48}, {&(0x7f0000000380)=""/91, 0x5b}, {&(0x7f00000004c0)=""/161, 0xa1}, {&(0x7f0000000580)=""/135, 0x87}, {&(0x7f0000000c80)=""/4096, 0x1000}, {&(0x7f0000000400)=""/55, 0x37}, {&(0x7f0000000640)=""/22, 0x16}], 0x9, &(0x7f0000000740)=""/193, 0xc1, 0x3}, 0x40000020) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 264.140647] FAULT_INJECTION: forcing a failure. [ 264.140647] name failslab, interval 1, probability 0, space 0, times 0 [ 264.151944] CPU: 1 PID: 5302 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 264.159124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.168469] Call Trace: [ 264.171051] dump_stack+0x194/0x24d [ 264.174671] ? arch_local_irq_restore+0x53/0x53 [ 264.179326] ? mutex_lock_io_nested+0x1900/0x1900 [ 264.184150] ? __memcg_init_list_lru_node+0x169/0x270 [ 264.189336] should_fail+0x8c0/0xa40 [ 264.193043] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.198139] ? trace_hardirqs_off+0x10/0x10 [ 264.202445] ? lock_downgrade+0x980/0x980 [ 264.206582] ? trace_hardirqs_off+0x10/0x10 [ 264.210895] ? find_held_lock+0x35/0x1d0 [ 264.214950] ? __lock_is_held+0xb6/0x140 [ 264.219028] ? check_same_owner+0x320/0x320 [ 264.223337] ? rcu_note_context_switch+0x710/0x710 [ 264.228245] ? rcu_note_context_switch+0x710/0x710 [ 264.233173] should_failslab+0xec/0x120 [ 264.237128] __kmalloc+0x63/0x760 [ 264.240570] ? __kmalloc_node+0x47/0x70 [ 264.244524] ? __list_lru_init+0xcf/0x750 [ 264.248665] __list_lru_init+0xcf/0x750 [ 264.252633] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 264.258503] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 264.263515] ? lockdep_init_map+0x9/0x10 [ 264.267570] sget_userns+0x6b1/0xe40 [ 264.271263] ? kernfs_sop_show_path+0x190/0x190 [ 264.275922] ? kernfs_sop_show_options+0x180/0x180 [ 264.280834] ? destroy_unused_super.part.6+0xd0/0xd0 [ 264.285941] ? check_same_owner+0x320/0x320 [ 264.290244] ? rcu_pm_notify+0xc0/0xc0 [ 264.294133] ? rcu_read_lock_sched_held+0x108/0x120 [ 264.299131] ? kmem_cache_alloc_trace+0x459/0x740 [ 264.303960] ? lock_downgrade+0x980/0x980 [ 264.308111] kernfs_mount_ns+0x13d/0x8b0 [ 264.312159] ? kernfs_super_ns+0x70/0x70 [ 264.316225] sysfs_mount+0xc2/0x1c0 [ 264.319834] ? sysfs_kill_sb+0x40/0x40 [ 264.323706] ? alloc_pages_current+0xbe/0x1e0 [ 264.328186] ? security_sb_copy_data+0x81/0xb0 [ 264.332755] mount_fs+0x66/0x2d0 [ 264.336116] vfs_kern_mount.part.26+0xc6/0x4a0 [ 264.340685] ? may_umount+0xa0/0xa0 [ 264.344294] ? _raw_read_unlock+0x22/0x30 [ 264.348421] ? __get_fs_type+0x8a/0xc0 [ 264.352305] do_mount+0xea4/0x2bb0 [ 264.355842] ? copy_mount_string+0x40/0x40 [ 264.360062] ? rcu_pm_notify+0xc0/0xc0 [ 264.363950] ? copy_mount_options+0x5f/0x2e0 [ 264.368335] ? rcu_read_lock_sched_held+0x108/0x120 [ 264.373333] ? kmem_cache_alloc_trace+0x459/0x740 [ 264.378162] ? kasan_check_write+0x14/0x20 [ 264.382377] ? _copy_from_user+0x99/0x110 [ 264.386518] ? copy_mount_options+0x1f7/0x2e0 [ 264.391009] SyS_mount+0xab/0x120 [ 264.394452] ? copy_mnt_ns+0xb30/0xb30 [ 264.398328] do_syscall_64+0x281/0x940 [ 264.402193] ? __do_page_fault+0xc90/0xc90 [ 264.406404] ? _raw_spin_unlock_irq+0x27/0x70 [ 264.410881] ? finish_task_switch+0x1c1/0x7e0 [ 264.415358] ? syscall_return_slowpath+0x550/0x550 [ 264.420269] ? syscall_return_slowpath+0x2ac/0x550 [ 264.425178] ? prepare_exit_to_usermode+0x350/0x350 [ 264.430174] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 264.435530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.440365] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.445531] RIP: 0033:0x4548b9 [ 264.448699] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.456385] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 264.463630] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 264.470875] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 264.478122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 264.485369] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/29 10:21:10 executing program 2 (fault-call:1 fault-nth:22): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:10 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762", 0x57}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:10 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0xfffffe0a, &(0x7f0000002080), 0x216, &(0x7f0000000000)=""/130, 0xfffffffffffffefa, 0xfffffffffffffff7}, 0x40) socketpair(0x2, 0x800, 0x6, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x2ab) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f00000001c0)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000200)={0x2, 0x0, [0x0, 0x0]}) socketpair$inet(0x2, 0x0, 0x7, &(0x7f0000000380)) close(r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:10 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:10 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 264.642692] FAULT_INJECTION: forcing a failure. [ 264.642692] name failslab, interval 1, probability 0, space 0, times 0 [ 264.654065] CPU: 0 PID: 5346 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 264.661266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.670619] Call Trace: [ 264.673216] dump_stack+0x194/0x24d [ 264.677552] ? arch_local_irq_restore+0x53/0x53 [ 264.682227] ? kernel_text_address+0x102/0x140 [ 264.686918] should_fail+0x8c0/0xa40 [ 264.690621] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 264.695735] ? save_stack+0x43/0xd0 [ 264.699347] ? kasan_kmalloc+0xad/0xe0 [ 264.703217] ? __kmalloc+0x162/0x760 [ 264.706908] ? __list_lru_init+0xcf/0x750 [ 264.711047] ? find_held_lock+0x35/0x1d0 [ 264.715106] ? __lock_is_held+0xb6/0x140 [ 264.719186] ? check_same_owner+0x320/0x320 [ 264.723513] ? rcu_note_context_switch+0x710/0x710 [ 264.728431] should_failslab+0xec/0x120 [ 264.732391] kmem_cache_alloc_node_trace+0x5a/0x760 [ 264.737392] ? mark_held_locks+0xaf/0x100 [ 264.741545] ? __raw_spin_lock_init+0x1c/0x100 [ 264.746113] __kmalloc_node+0x33/0x70 [ 264.749894] kvmalloc_node+0x99/0xd0 [ 264.753596] __list_lru_init+0x5d5/0x750 [ 264.757640] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 264.763509] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 264.768519] ? lockdep_init_map+0x9/0x10 [ 264.772563] sget_userns+0x6b1/0xe40 [ 264.776251] ? kernfs_sop_show_path+0x190/0x190 [ 264.780898] ? kernfs_sop_show_options+0x180/0x180 [ 264.785808] ? destroy_unused_super.part.6+0xd0/0xd0 [ 264.790898] ? check_same_owner+0x320/0x320 [ 264.795207] ? rcu_pm_notify+0xc0/0xc0 [ 264.799082] ? rcu_read_lock_sched_held+0x108/0x120 [ 264.804074] ? kmem_cache_alloc_trace+0x459/0x740 [ 264.808901] ? lock_downgrade+0x980/0x980 [ 264.813059] kernfs_mount_ns+0x13d/0x8b0 [ 264.817103] ? kernfs_super_ns+0x70/0x70 [ 264.821153] sysfs_mount+0xc2/0x1c0 [ 264.824756] ? sysfs_kill_sb+0x40/0x40 [ 264.828631] ? alloc_pages_current+0xbe/0x1e0 [ 264.833112] ? security_sb_copy_data+0x81/0xb0 [ 264.837675] mount_fs+0x66/0x2d0 [ 264.841038] vfs_kern_mount.part.26+0xc6/0x4a0 [ 264.845609] ? may_umount+0xa0/0xa0 [ 264.849220] ? _raw_read_unlock+0x22/0x30 [ 264.853352] ? __get_fs_type+0x8a/0xc0 [ 264.857223] do_mount+0xea4/0x2bb0 [ 264.860748] ? copy_mount_string+0x40/0x40 [ 264.864961] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 264.869955] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 264.874694] ? retint_kernel+0x10/0x10 [ 264.878585] ? copy_mount_options+0x183/0x2e0 [ 264.883058] ? copy_mount_options+0x1f7/0x2e0 [ 264.887534] SyS_mount+0xab/0x120 [ 264.890961] ? copy_mnt_ns+0xb30/0xb30 [ 264.894836] do_syscall_64+0x281/0x940 [ 264.898698] ? __do_page_fault+0xc90/0xc90 [ 264.902912] ? _raw_spin_unlock_irq+0x27/0x70 [ 264.907473] ? finish_task_switch+0x1c1/0x7e0 [ 264.911958] ? syscall_return_slowpath+0x550/0x550 [ 264.916868] ? syscall_return_slowpath+0x2ac/0x550 [ 264.921784] ? prepare_exit_to_usermode+0x350/0x350 [ 264.926785] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 264.932146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 264.936971] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 264.942134] RIP: 0033:0x4548b9 [ 264.945296] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 264.952979] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 264.960224] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 264.967472] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 264.974731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 264.981975] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/29 10:21:11 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x8009, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:11 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:11 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 2018/03/29 10:21:11 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:11 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000000dc0), 0x0, &(0x7f0000006d40)=""/65, 0xfffffffffffffeec}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) socketpair$packet(0x11, 0x200000000000002, 0x300, &(0x7f0000001080)) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000000f00)='./file0\x00', 0x8) mount(&(0x7f0000000d80)='./file0/file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x1011080, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000f40)={0x5, 0xd866, 0x40, 0x2, 0x9, r1, 0x5}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000fc0)={r2, 0x28, &(0x7f0000000f80)}, 0x10) mkdir(&(0x7f0000000d40)='./file1\x00', 0x11) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) socketpair(0x3, 0x5, 0xfffffffffffffffc, &(0x7f0000000e00)) socketpair(0x13, 0x80000, 0xb9, &(0x7f0000000dc0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000e40)="004ba4bcbfa9470b65e0c49b1dc81a9664f706220f2f5b4ada8889de3efd323c6eca11ae084aa1a45928dbc1b410aa67d64b9ca060937223977dd138d508b2addee02308bcfb1c1d52800d529382d6977b4753fca2fb262113193e") 2018/03/29 10:21:11 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c5", 0x58}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:11 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xa9, 0x7, 0xc5f, 0x10, r0, 0x4e9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x28, &(0x7f0000000040)}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r2, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) 2018/03/29 10:21:11 executing program 2 (fault-call:1 fault-nth:23): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) [ 265.099538] FAULT_INJECTION: forcing a failure. [ 265.099538] name failslab, interval 1, probability 0, space 0, times 0 [ 265.110872] CPU: 1 PID: 5385 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 265.118054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.127409] Call Trace: [ 265.130011] dump_stack+0x194/0x24d [ 265.133654] ? arch_local_irq_restore+0x53/0x53 [ 265.138343] should_fail+0x8c0/0xa40 [ 265.142046] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.147125] ? __kernel_text_address+0xd/0x40 [ 265.151600] ? unwind_get_return_address+0x61/0xa0 [ 265.156528] ? find_held_lock+0x35/0x1d0 [ 265.160571] ? __lock_is_held+0xb6/0x140 [ 265.164629] ? check_same_owner+0x320/0x320 [ 265.168930] ? rcu_note_context_switch+0x710/0x710 [ 265.173850] should_failslab+0xec/0x120 [ 265.177801] kmem_cache_alloc_trace+0x4b/0x740 [ 265.182359] ? __kmalloc_node+0x33/0x70 [ 265.186309] ? __kmalloc_node+0x33/0x70 [ 265.190262] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.195264] __memcg_init_list_lru_node+0x169/0x270 [ 265.200266] ? list_lru_add+0x7c0/0x7c0 [ 265.204217] ? __kmalloc_node+0x47/0x70 [ 265.208183] __list_lru_init+0x544/0x750 [ 265.212227] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 265.218089] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 265.223091] ? lockdep_init_map+0x9/0x10 [ 265.227132] sget_userns+0x6b1/0xe40 [ 265.230821] ? kernfs_sop_show_path+0x190/0x190 [ 265.235473] ? kernfs_sop_show_options+0x180/0x180 [ 265.240381] ? destroy_unused_super.part.6+0xd0/0xd0 [ 265.245475] ? check_same_owner+0x320/0x320 [ 265.249776] ? rcu_pm_notify+0xc0/0xc0 [ 265.253654] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.258646] ? kmem_cache_alloc_trace+0x459/0x740 [ 265.263462] ? lock_downgrade+0x980/0x980 [ 265.267603] kernfs_mount_ns+0x13d/0x8b0 [ 265.271644] ? kernfs_super_ns+0x70/0x70 [ 265.275697] sysfs_mount+0xc2/0x1c0 [ 265.279299] ? sysfs_kill_sb+0x40/0x40 [ 265.283166] ? alloc_pages_current+0xbe/0x1e0 [ 265.287640] ? security_sb_copy_data+0x81/0xb0 [ 265.292205] mount_fs+0x66/0x2d0 [ 265.295554] vfs_kern_mount.part.26+0xc6/0x4a0 [ 265.300115] ? may_umount+0xa0/0xa0 [ 265.303718] ? _raw_read_unlock+0x22/0x30 [ 265.307847] ? __get_fs_type+0x8a/0xc0 [ 265.311723] do_mount+0xea4/0x2bb0 [ 265.315248] ? copy_mount_string+0x40/0x40 [ 265.319459] ? rcu_pm_notify+0xc0/0xc0 [ 265.323336] ? copy_mount_options+0x5f/0x2e0 [ 265.327718] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.332711] ? kmem_cache_alloc_trace+0x459/0x740 [ 265.337530] ? kasan_check_write+0x14/0x20 [ 265.341741] ? _copy_from_user+0x99/0x110 [ 265.345879] ? copy_mount_options+0x1f7/0x2e0 [ 265.350359] SyS_mount+0xab/0x120 [ 265.353788] ? copy_mnt_ns+0xb30/0xb30 [ 265.357658] do_syscall_64+0x281/0x940 [ 265.361521] ? __do_page_fault+0xc90/0xc90 [ 265.365726] ? _raw_spin_unlock_irq+0x27/0x70 [ 265.370199] ? finish_task_switch+0x1c1/0x7e0 [ 265.374674] ? syscall_return_slowpath+0x550/0x550 [ 265.379580] ? syscall_return_slowpath+0x2ac/0x550 [ 265.384485] ? prepare_exit_to_usermode+0x350/0x350 [ 265.389478] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 265.394825] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.399653] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.404816] RIP: 0033:0x4548b9 [ 265.407982] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.415668] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 265.422915] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 265.430158] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 265.437401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/03/29 10:21:11 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 2018/03/29 10:21:11 executing program 2 (fault-call:1 fault-nth:24): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:11 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 265.444644] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/29 10:21:11 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c5", 0x58}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:11 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:11 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0xffffff8a) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:11 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 265.556761] FAULT_INJECTION: forcing a failure. [ 265.556761] name failslab, interval 1, probability 0, space 0, times 0 [ 265.568168] CPU: 0 PID: 5413 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 265.575359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.584722] Call Trace: [ 265.587318] dump_stack+0x194/0x24d [ 265.590960] ? arch_local_irq_restore+0x53/0x53 [ 265.595631] ? __save_stack_trace+0x7e/0xd0 [ 265.599970] should_fail+0x8c0/0xa40 [ 265.603695] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 265.608800] ? kasan_kmalloc+0xad/0xe0 [ 265.612682] ? kmem_cache_alloc_trace+0x136/0x740 [ 265.617509] ? __memcg_init_list_lru_node+0x169/0x270 [ 265.622690] ? __list_lru_init+0x544/0x750 [ 265.626908] ? sget_userns+0x6b1/0xe40 [ 265.630778] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 265.635523] ? do_mount+0xea4/0x2bb0 [ 265.639229] ? SyS_mount+0xab/0x120 [ 265.642852] ? do_syscall_64+0x281/0x940 [ 265.646912] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.652304] ? find_held_lock+0x35/0x1d0 [ 265.656362] ? __lock_is_held+0xb6/0x140 [ 265.660437] ? check_same_owner+0x320/0x320 [ 265.664752] ? rcu_note_context_switch+0x710/0x710 [ 265.669692] should_failslab+0xec/0x120 [ 265.673661] kmem_cache_alloc_trace+0x4b/0x740 [ 265.678226] ? __kmalloc_node+0x33/0x70 [ 265.682183] ? __kmalloc_node+0x33/0x70 [ 265.686144] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.691151] __memcg_init_list_lru_node+0x169/0x270 [ 265.696174] ? list_lru_add+0x7c0/0x7c0 [ 265.700137] ? __kmalloc_node+0x47/0x70 [ 265.704101] __list_lru_init+0x544/0x750 [ 265.708162] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 265.714046] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 265.719074] ? lockdep_init_map+0x9/0x10 [ 265.723135] sget_userns+0x6b1/0xe40 [ 265.726832] ? kernfs_sop_show_path+0x190/0x190 [ 265.731499] ? kernfs_sop_show_options+0x180/0x180 [ 265.736417] ? destroy_unused_super.part.6+0xd0/0xd0 [ 265.741517] ? check_same_owner+0x320/0x320 [ 265.745822] ? rcu_pm_notify+0xc0/0xc0 [ 265.749709] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.754702] ? kmem_cache_alloc_trace+0x459/0x740 [ 265.759522] ? lock_downgrade+0x980/0x980 [ 265.763671] kernfs_mount_ns+0x13d/0x8b0 [ 265.767719] ? kernfs_super_ns+0x70/0x70 [ 265.771781] sysfs_mount+0xc2/0x1c0 [ 265.775392] ? sysfs_kill_sb+0x40/0x40 [ 265.779262] ? alloc_pages_current+0xbe/0x1e0 [ 265.783740] ? security_sb_copy_data+0x81/0xb0 [ 265.788311] mount_fs+0x66/0x2d0 [ 265.791666] vfs_kern_mount.part.26+0xc6/0x4a0 [ 265.796241] ? may_umount+0xa0/0xa0 [ 265.799852] ? _raw_read_unlock+0x22/0x30 [ 265.803984] ? __get_fs_type+0x8a/0xc0 [ 265.807864] do_mount+0xea4/0x2bb0 [ 265.811401] ? copy_mount_string+0x40/0x40 [ 265.815625] ? rcu_pm_notify+0xc0/0xc0 [ 265.819500] ? copy_mount_options+0x5f/0x2e0 [ 265.823885] ? rcu_read_lock_sched_held+0x108/0x120 [ 265.828880] ? kmem_cache_alloc_trace+0x459/0x740 [ 265.833733] ? kasan_check_write+0x14/0x20 [ 265.837958] ? _copy_from_user+0x99/0x110 [ 265.842174] ? copy_mount_options+0x1f7/0x2e0 [ 265.846656] SyS_mount+0xab/0x120 [ 265.850089] ? copy_mnt_ns+0xb30/0xb30 [ 265.853959] do_syscall_64+0x281/0x940 [ 265.857829] ? __do_page_fault+0xc90/0xc90 [ 265.862045] ? _raw_spin_unlock_irq+0x27/0x70 [ 265.866534] ? finish_task_switch+0x1c1/0x7e0 [ 265.871020] ? syscall_return_slowpath+0x550/0x550 [ 265.875934] ? syscall_return_slowpath+0x2ac/0x550 [ 265.880843] ? prepare_exit_to_usermode+0x350/0x350 [ 265.885839] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 265.891183] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 265.896012] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 265.901193] RIP: 0033:0x4548b9 2018/03/29 10:21:12 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c5", 0x58}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 265.904367] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 265.912053] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 265.919299] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 265.926543] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 265.933787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 265.941035] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/29 10:21:12 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000), 0x0, 0xfffffffffffffffd}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:12 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) mkdir(&(0x7f0000000d40)='./file0\x00', 0x60) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file1\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:12 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 2018/03/29 10:21:12 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:12 executing program 2 (fault-call:1 fault-nth:25): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:12 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r0}, 0x10) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r1, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r1, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r1, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) [ 266.074924] FAULT_INJECTION: forcing a failure. [ 266.074924] name failslab, interval 1, probability 0, space 0, times 0 [ 266.086303] CPU: 1 PID: 5456 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 266.093488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.102838] Call Trace: [ 266.105431] dump_stack+0x194/0x24d [ 266.109055] ? arch_local_irq_restore+0x53/0x53 [ 266.113723] ? __save_stack_trace+0x7e/0xd0 [ 266.118052] should_fail+0x8c0/0xa40 [ 266.121758] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.126852] ? kasan_kmalloc+0xad/0xe0 [ 266.130723] ? kmem_cache_alloc_trace+0x136/0x740 [ 266.135554] ? __memcg_init_list_lru_node+0x169/0x270 [ 266.140738] ? __list_lru_init+0x544/0x750 [ 266.144964] ? sget_userns+0x6b1/0xe40 [ 266.148852] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 266.153604] ? do_mount+0xea4/0x2bb0 [ 266.157302] ? SyS_mount+0xab/0x120 [ 266.160919] ? do_syscall_64+0x281/0x940 [ 266.164970] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.170338] ? find_held_lock+0x35/0x1d0 [ 266.174404] ? __lock_is_held+0xb6/0x140 [ 266.178484] ? check_same_owner+0x320/0x320 [ 266.182799] ? rcu_note_context_switch+0x710/0x710 [ 266.187733] should_failslab+0xec/0x120 [ 266.191687] kmem_cache_alloc_trace+0x4b/0x740 [ 266.196417] ? __kmalloc_node+0x33/0x70 [ 266.200375] ? __kmalloc_node+0x33/0x70 [ 266.204329] ? rcu_read_lock_sched_held+0x108/0x120 [ 266.209331] __memcg_init_list_lru_node+0x169/0x270 [ 266.214328] ? list_lru_add+0x7c0/0x7c0 [ 266.218282] ? __kmalloc_node+0x47/0x70 [ 266.222242] __list_lru_init+0x544/0x750 [ 266.226288] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 266.232154] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 266.237158] ? lockdep_init_map+0x9/0x10 [ 266.241199] sget_userns+0x6b1/0xe40 [ 266.244891] ? kernfs_sop_show_path+0x190/0x190 [ 266.249544] ? kernfs_sop_show_options+0x180/0x180 [ 266.254459] ? destroy_unused_super.part.6+0xd0/0xd0 [ 266.259555] ? check_same_owner+0x320/0x320 [ 266.263852] ? rcu_pm_notify+0xc0/0xc0 [ 266.267730] ? rcu_read_lock_sched_held+0x108/0x120 [ 266.272723] ? kmem_cache_alloc_trace+0x459/0x740 [ 266.277538] ? lock_downgrade+0x980/0x980 [ 266.281675] kernfs_mount_ns+0x13d/0x8b0 [ 266.285715] ? kernfs_super_ns+0x70/0x70 [ 266.289766] sysfs_mount+0xc2/0x1c0 [ 266.293369] ? sysfs_kill_sb+0x40/0x40 [ 266.297236] ? alloc_pages_current+0xbe/0x1e0 [ 266.301710] ? security_sb_copy_data+0x81/0xb0 [ 266.306274] mount_fs+0x66/0x2d0 [ 266.309624] vfs_kern_mount.part.26+0xc6/0x4a0 [ 266.314185] ? may_umount+0xa0/0xa0 [ 266.317789] ? _raw_read_unlock+0x22/0x30 [ 266.321914] ? __get_fs_type+0x8a/0xc0 [ 266.325785] do_mount+0xea4/0x2bb0 [ 266.329313] ? copy_mount_string+0x40/0x40 [ 266.333524] ? rcu_pm_notify+0xc0/0xc0 [ 266.337401] ? copy_mount_options+0x5f/0x2e0 [ 266.341784] ? rcu_read_lock_sched_held+0x108/0x120 [ 266.346776] ? kmem_cache_alloc_trace+0x459/0x740 [ 266.351600] ? kasan_check_write+0x14/0x20 [ 266.355813] ? _copy_from_user+0x99/0x110 [ 266.359945] ? copy_mount_options+0x1f7/0x2e0 [ 266.364423] SyS_mount+0xab/0x120 [ 266.367849] ? copy_mnt_ns+0xb30/0xb30 [ 266.371722] do_syscall_64+0x281/0x940 [ 266.375588] ? __do_page_fault+0xc90/0xc90 [ 266.379797] ? _raw_spin_unlock_irq+0x27/0x70 [ 266.384271] ? finish_task_switch+0x1c1/0x7e0 [ 266.388743] ? syscall_return_slowpath+0x550/0x550 [ 266.393652] ? syscall_return_slowpath+0x2ac/0x550 [ 266.398561] ? prepare_exit_to_usermode+0x350/0x350 [ 266.403560] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 266.408906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.413732] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.418895] RIP: 0033:0x4548b9 [ 266.422059] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 266.429745] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 266.436993] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 266.444240] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 266.451486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 266.458729] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/29 10:21:12 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:12 executing program 0 (fault-call:4 fault-nth:0): socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:12 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='..', 0x0, 0x10}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000080)='..', r3}, 0x5dee5453b78a8714) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8002b, 0xffffffffffffffff, &(0x7f0000000100)) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r3}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r5}, 0x10) 2018/03/29 10:21:12 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000d40)) 2018/03/29 10:21:12 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:12 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r0}, 0x10) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r1, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r1, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r1, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) 2018/03/29 10:21:12 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={0xffffffffffffff9c, 0x50, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)=r3, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) recvmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000000380)=[{&(0x7f00000004c0)=""/238, 0xee}, {&(0x7f0000000c80)=""/4096, 0x1000}], 0x2, &(0x7f00000003c0)=""/18, 0x12, 0x80000000}, 0x40000000) 2018/03/29 10:21:12 executing program 2 (fault-call:1 fault-nth:26): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) [ 266.545933] FAULT_INJECTION: forcing a failure. [ 266.545933] name failslab, interval 1, probability 0, space 0, times 0 [ 266.557279] CPU: 1 PID: 5501 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 266.564462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.573797] Call Trace: [ 266.576367] dump_stack+0x194/0x24d [ 266.579974] ? arch_local_irq_restore+0x53/0x53 [ 266.584622] ? __save_stack_trace+0x7e/0xd0 [ 266.588934] should_fail+0x8c0/0xa40 [ 266.592629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.597707] ? kasan_kmalloc+0xad/0xe0 [ 266.601567] ? kmem_cache_alloc_trace+0x136/0x740 [ 266.606386] ? __memcg_init_list_lru_node+0x169/0x270 [ 266.611549] ? __list_lru_init+0x544/0x750 [ 266.615757] ? sget_userns+0x6b1/0xe40 [ 266.619640] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 266.624370] ? do_mount+0xea4/0x2bb0 [ 266.628055] ? SyS_mount+0xab/0x120 [ 266.631656] ? do_syscall_64+0x281/0x940 [ 266.635694] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.641046] ? find_held_lock+0x35/0x1d0 [ 266.645090] ? __lock_is_held+0xb6/0x140 [ 266.649148] ? check_same_owner+0x320/0x320 [ 266.653452] ? rcu_note_context_switch+0x710/0x710 [ 266.658372] should_failslab+0xec/0x120 [ 266.662323] kmem_cache_alloc_trace+0x4b/0x740 [ 266.666883] ? __kmalloc_node+0x33/0x70 [ 266.670833] ? __kmalloc_node+0x33/0x70 [ 266.674802] ? rcu_read_lock_sched_held+0x108/0x120 [ 266.679812] __memcg_init_list_lru_node+0x169/0x270 [ 266.684815] ? list_lru_add+0x7c0/0x7c0 [ 266.688768] ? __kmalloc_node+0x47/0x70 [ 266.692730] __list_lru_init+0x544/0x750 [ 266.696778] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 266.702645] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 266.707648] ? lockdep_init_map+0x9/0x10 [ 266.711690] sget_userns+0x6b1/0xe40 [ 266.715378] ? kernfs_sop_show_path+0x190/0x190 [ 266.720036] ? kernfs_sop_show_options+0x180/0x180 [ 266.724945] ? destroy_unused_super.part.6+0xd0/0xd0 [ 266.730044] ? check_same_owner+0x320/0x320 [ 266.734346] ? rcu_pm_notify+0xc0/0xc0 [ 266.738228] ? rcu_read_lock_sched_held+0x108/0x120 [ 266.743218] ? kmem_cache_alloc_trace+0x459/0x740 [ 266.748035] ? lock_downgrade+0x980/0x980 [ 266.752174] kernfs_mount_ns+0x13d/0x8b0 [ 266.756217] ? kernfs_super_ns+0x70/0x70 [ 266.760269] sysfs_mount+0xc2/0x1c0 [ 266.763874] ? sysfs_kill_sb+0x40/0x40 [ 266.767742] ? alloc_pages_current+0xbe/0x1e0 [ 266.772219] ? security_sb_copy_data+0x81/0xb0 [ 266.776782] mount_fs+0x66/0x2d0 [ 266.780135] vfs_kern_mount.part.26+0xc6/0x4a0 [ 266.784696] ? may_umount+0xa0/0xa0 [ 266.788302] ? _raw_read_unlock+0x22/0x30 [ 266.792430] ? __get_fs_type+0x8a/0xc0 [ 266.796302] do_mount+0xea4/0x2bb0 [ 266.799828] ? copy_mount_string+0x40/0x40 [ 266.804045] ? rcu_pm_notify+0xc0/0xc0 [ 266.807924] ? copy_mount_options+0x5f/0x2e0 [ 266.812310] ? rcu_read_lock_sched_held+0x108/0x120 [ 266.817306] ? kmem_cache_alloc_trace+0x459/0x740 [ 266.822128] ? kasan_check_write+0x14/0x20 [ 266.826345] ? _copy_from_user+0x99/0x110 [ 266.830571] ? copy_mount_options+0x1f7/0x2e0 [ 266.835051] SyS_mount+0xab/0x120 [ 266.838482] ? copy_mnt_ns+0xb30/0xb30 [ 266.842350] do_syscall_64+0x281/0x940 [ 266.846214] ? __do_page_fault+0xc90/0xc90 [ 266.850421] ? _raw_spin_unlock_irq+0x27/0x70 [ 266.854894] ? finish_task_switch+0x1c1/0x7e0 [ 266.859366] ? syscall_return_slowpath+0x550/0x550 [ 266.864272] ? syscall_return_slowpath+0x2ac/0x550 [ 266.869177] ? prepare_exit_to_usermode+0x350/0x350 [ 266.874169] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 266.879514] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 266.884343] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 266.889506] RIP: 0033:0x4548b9 [ 266.892669] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 266.900354] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 266.907601] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 266.914848] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 266.922090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 266.929335] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 266.939770] FAULT_INJECTION: forcing a failure. [ 266.939770] name failslab, interval 1, probability 0, space 0, times 0 [ 266.951227] CPU: 0 PID: 5505 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #40 [ 266.958405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.967737] Call Trace: [ 266.970310] dump_stack+0x194/0x24d [ 266.973925] ? arch_local_irq_restore+0x53/0x53 [ 266.978586] should_fail+0x8c0/0xa40 [ 266.982281] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 266.987363] ? __lock_acquire+0x664/0x3e00 [ 266.991583] ? filemap_map_pages+0x919/0x15d0 [ 266.996066] ? find_held_lock+0x35/0x1d0 [ 267.000110] ? __lock_is_held+0xb6/0x140 [ 267.004164] ? check_same_owner+0x320/0x320 [ 267.008462] ? print_irqtrace_events+0x270/0x270 [ 267.013197] ? rcu_note_context_switch+0x710/0x710 [ 267.018117] should_failslab+0xec/0x120 [ 267.022070] kmem_cache_alloc_trace+0x4b/0x740 [ 267.026632] ? __lock_acquire+0x664/0x3e00 [ 267.030852] perf_event_alloc+0x200/0x2b00 [ 267.035075] ? __perf_install_in_context+0x2d0/0x2d0 [ 267.040154] ? __might_sleep+0x95/0x190 [ 267.044110] ? SYSC_perf_event_open+0x12ca/0x2e00 [ 267.048930] ? __mutex_lock+0x16f/0x1a80 [ 267.052965] ? SYSC_perf_event_open+0x12ca/0x2e00 [ 267.057784] ? expand_files+0x4fd/0x910 [ 267.061732] ? lock_acquire+0x1d5/0x580 [ 267.065695] ? mutex_lock_io_nested+0x1900/0x1900 [ 267.070515] ? perf_trace_lock+0xd6/0x900 [ 267.074642] ? perf_trace_lock+0xd6/0x900 [ 267.078769] ? trace_event_raw_event_lock+0x340/0x340 [ 267.083936] ? trace_event_raw_event_lock+0x340/0x340 [ 267.089103] ? do_raw_spin_trylock+0x190/0x190 [ 267.093663] ? trace_hardirqs_off+0x10/0x10 [ 267.097964] ? trace_hardirqs_off+0x10/0x10 [ 267.102352] ? _raw_spin_unlock+0x22/0x30 [ 267.106476] ? __alloc_fd+0x29b/0x750 [ 267.110260] ? find_held_lock+0x35/0x1d0 [ 267.114311] ? ptrace_may_access+0x3a/0x50 [ 267.118522] ? lock_downgrade+0x980/0x980 [ 267.122650] ? lock_release+0xa40/0xa40 [ 267.126604] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 267.131506] ? __ptrace_may_access+0x426/0x810 [ 267.136066] ? do_raw_spin_trylock+0x190/0x190 [ 267.140625] ? ptrace_getsiginfo+0x190/0x190 [ 267.145007] ? get_unused_fd_flags+0x121/0x190 [ 267.149591] SYSC_perf_event_open+0x84e/0x2e00 [ 267.154154] ? find_held_lock+0x35/0x1d0 [ 267.158207] ? perf_event_set_output+0x5a0/0x5a0 [ 267.162971] ? __sb_end_write+0xa0/0xd0 [ 267.166946] ? SyS_read+0x220/0x220 [ 267.170558] SyS_perf_event_open+0x39/0x50 [ 267.174772] ? perf_bp_event+0x2e0/0x2e0 [ 267.178811] do_syscall_64+0x281/0x940 [ 267.182675] ? __do_page_fault+0xc90/0xc90 [ 267.186885] ? _raw_spin_unlock_irq+0x27/0x70 [ 267.191354] ? finish_task_switch+0x1c1/0x7e0 [ 267.195827] ? syscall_return_slowpath+0x550/0x550 [ 267.200735] ? syscall_return_slowpath+0x2ac/0x550 [ 267.205643] ? prepare_exit_to_usermode+0x350/0x350 [ 267.210635] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 267.215983] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.220813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.225977] RIP: 0033:0x4548b9 [ 267.229141] RSP: 002b:00007fdb8f3f9c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 267.236827] RAX: ffffffffffffffda RBX: 00007fdb8f3fa6d4 RCX: 00000000004548b9 2018/03/29 10:21:13 executing program 2 (fault-call:1 fault-nth:27): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:13 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x0, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 267.244072] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020348f88 [ 267.251318] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 267.258562] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000015 [ 267.265805] R13: 0000000000000458 R14: 00000000006f88e0 R15: 0000000000000000 [ 267.314846] FAULT_INJECTION: forcing a failure. [ 267.314846] name failslab, interval 1, probability 0, space 0, times 0 [ 267.326167] CPU: 0 PID: 5513 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 267.333361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.342717] Call Trace: [ 267.345319] dump_stack+0x194/0x24d [ 267.348957] ? arch_local_irq_restore+0x53/0x53 [ 267.353623] ? __save_stack_trace+0x7e/0xd0 [ 267.357963] should_fail+0x8c0/0xa40 [ 267.361682] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.366786] ? kasan_kmalloc+0xad/0xe0 [ 267.370665] ? kmem_cache_alloc_trace+0x136/0x740 [ 267.375507] ? __memcg_init_list_lru_node+0x169/0x270 [ 267.380690] ? __list_lru_init+0x544/0x750 [ 267.384917] ? sget_userns+0x6b1/0xe40 [ 267.388802] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 267.393551] ? do_mount+0xea4/0x2bb0 [ 267.397256] ? SyS_mount+0xab/0x120 [ 267.400874] ? do_syscall_64+0x281/0x940 [ 267.404918] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.410275] ? find_held_lock+0x35/0x1d0 [ 267.414326] ? __lock_is_held+0xb6/0x140 [ 267.418388] ? check_same_owner+0x320/0x320 [ 267.422704] ? rcu_note_context_switch+0x710/0x710 [ 267.427643] should_failslab+0xec/0x120 [ 267.431606] kmem_cache_alloc_trace+0x4b/0x740 [ 267.436164] ? __kmalloc_node+0x33/0x70 [ 267.440112] ? __kmalloc_node+0x33/0x70 [ 267.444064] ? rcu_read_lock_sched_held+0x108/0x120 [ 267.449075] __memcg_init_list_lru_node+0x169/0x270 [ 267.454078] ? list_lru_add+0x7c0/0x7c0 [ 267.458041] ? __kmalloc_node+0x47/0x70 [ 267.462004] __list_lru_init+0x544/0x750 [ 267.466064] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 267.471942] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.476950] ? lockdep_init_map+0x9/0x10 [ 267.480994] sget_userns+0x6b1/0xe40 [ 267.484687] ? kernfs_sop_show_path+0x190/0x190 [ 267.489335] ? kernfs_sop_show_options+0x180/0x180 [ 267.494240] ? destroy_unused_super.part.6+0xd0/0xd0 [ 267.499333] ? check_same_owner+0x320/0x320 [ 267.503632] ? rcu_pm_notify+0xc0/0xc0 [ 267.507508] ? rcu_read_lock_sched_held+0x108/0x120 [ 267.512504] ? kmem_cache_alloc_trace+0x459/0x740 [ 267.517323] ? lock_downgrade+0x980/0x980 [ 267.521458] kernfs_mount_ns+0x13d/0x8b0 [ 267.525499] ? kernfs_super_ns+0x70/0x70 [ 267.529570] sysfs_mount+0xc2/0x1c0 [ 267.533173] ? sysfs_kill_sb+0x40/0x40 [ 267.537046] ? alloc_pages_current+0xbe/0x1e0 [ 267.541537] ? security_sb_copy_data+0x81/0xb0 [ 267.546102] mount_fs+0x66/0x2d0 [ 267.549450] vfs_kern_mount.part.26+0xc6/0x4a0 [ 267.554017] ? may_umount+0xa0/0xa0 [ 267.557630] ? _raw_read_unlock+0x22/0x30 [ 267.561753] ? __get_fs_type+0x8a/0xc0 [ 267.565627] do_mount+0xea4/0x2bb0 [ 267.569163] ? copy_mount_string+0x40/0x40 [ 267.573376] ? rcu_pm_notify+0xc0/0xc0 [ 267.577252] ? copy_mount_options+0x5f/0x2e0 [ 267.581640] ? rcu_read_lock_sched_held+0x108/0x120 [ 267.586640] ? kmem_cache_alloc_trace+0x459/0x740 [ 267.591482] ? copy_mount_options+0x1f7/0x2e0 [ 267.595958] SyS_mount+0xab/0x120 [ 267.599392] ? copy_mnt_ns+0xb30/0xb30 [ 267.603281] do_syscall_64+0x281/0x940 [ 267.607160] ? __do_page_fault+0xc90/0xc90 [ 267.611369] ? _raw_spin_unlock_irq+0x27/0x70 [ 267.615843] ? finish_task_switch+0x1c1/0x7e0 [ 267.620326] ? syscall_return_slowpath+0x550/0x550 [ 267.625246] ? syscall_return_slowpath+0x2ac/0x550 [ 267.630169] ? prepare_exit_to_usermode+0x350/0x350 [ 267.635173] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 267.640526] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.645358] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.650521] RIP: 0033:0x4548b9 [ 267.653687] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:21:13 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:13 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x7ffffffffd, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 2018/03/29 10:21:13 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000010c0)={r0, 0x50, &(0x7f0000001040)}, 0x10) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) sendmsg$kcm(r1, &(0x7f0000000fc0)={&(0x7f0000000d40)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes192\x00'}, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000dc0)="0bb1ea9839414bb2de7bb1ca5c8726f601f5142c88ba160dfac5be8564e76096a082355b6d3aa39e0285f0bb10f01bb7b93c280dc329810394b7d65d523805171afdea5ba0d74b51061c0d05ddbff35b88c91c42c9abd7384c936e32859a0b5dafd0834529c367bfe20cb1fb0b4167f7cfb3bc6bc247c9ab7880d794b029b47139679846c8408645ae6bede5f66b13cfd1238e0434d088ba35e6c1b375bdc7bf07dacf6df4d713345e855b1d", 0xac}, {&(0x7f0000000e80)="4ab0941f25b4c44b405a6357d526528237537a47455b42a90d67d78743b498ba1ed72da0fd59bf43c598a838046fb8a34ce2fdf38b", 0x35}, {&(0x7f0000000ec0)="191eef03b38c3095713e2b1e43c906dd15581de1946721934d9905be152b31dc98413408efe283a9c87972cd5b88353df501f5faeae1918ff7a4ef1197590b32aaca4569459f460f42255ec9ddf0ff6c1b43ee3fa6df1896d1a42c61211273aa64891475b84f532e8b0e0dc9c7dbca7eae29dfd3dcb3894c31bb9656afeb305c088c862ff49b2b2ea1b75edd331e86a88edbb46eb0d3", 0x96}], 0x3, &(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x20e0, 0x20000000}, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) socketpair(0x17, 0x3, 0x9, &(0x7f0000001000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:13 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x0, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:13 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000c, 0xffffffffffffffff, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:13 executing program 0 (fault-call:4 fault-nth:1): socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:13 executing program 2 (fault-call:1 fault-nth:28): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:13 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r0}, 0x10) r2 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r1, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r1, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r1, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r1, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r1}, 0x10) [ 267.661370] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 267.668614] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 267.675860] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 267.683108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 267.690354] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 267.772351] FAULT_INJECTION: forcing a failure. [ 267.772351] name failslab, interval 1, probability 0, space 0, times 0 [ 267.783778] CPU: 0 PID: 5542 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 267.789516] FAULT_INJECTION: forcing a failure. [ 267.789516] name failslab, interval 1, probability 0, space 0, times 0 [ 267.790961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.791015] Call Trace: [ 267.791032] dump_stack+0x194/0x24d [ 267.791052] ? arch_local_irq_restore+0x53/0x53 [ 267.822354] ? __save_stack_trace+0x7e/0xd0 [ 267.826680] should_fail+0x8c0/0xa40 [ 267.830384] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.835470] ? kasan_kmalloc+0xad/0xe0 [ 267.839339] ? kmem_cache_alloc_trace+0x136/0x740 [ 267.844167] ? __memcg_init_list_lru_node+0x169/0x270 [ 267.849337] ? __list_lru_init+0x544/0x750 [ 267.853551] ? sget_userns+0x6b1/0xe40 [ 267.857427] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 267.862163] ? do_mount+0xea4/0x2bb0 [ 267.865854] ? SyS_mount+0xab/0x120 [ 267.869465] ? do_syscall_64+0x281/0x940 [ 267.873509] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 267.878883] ? find_held_lock+0x35/0x1d0 [ 267.882944] ? __lock_is_held+0xb6/0x140 [ 267.887024] ? check_same_owner+0x320/0x320 [ 267.891357] ? rcu_note_context_switch+0x710/0x710 [ 267.896301] should_failslab+0xec/0x120 [ 267.900260] kmem_cache_alloc_trace+0x4b/0x740 [ 267.904825] ? __kmalloc_node+0x33/0x70 [ 267.908800] ? __kmalloc_node+0x33/0x70 [ 267.912770] ? rcu_read_lock_sched_held+0x108/0x120 [ 267.917780] __memcg_init_list_lru_node+0x169/0x270 [ 267.922789] ? list_lru_add+0x7c0/0x7c0 [ 267.926751] ? __kmalloc_node+0x47/0x70 [ 267.930724] __list_lru_init+0x544/0x750 [ 267.934779] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 267.940650] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 267.945662] ? lockdep_init_map+0x9/0x10 [ 267.949710] sget_userns+0x6b1/0xe40 [ 267.953403] ? kernfs_sop_show_path+0x190/0x190 [ 267.958069] ? kernfs_sop_show_options+0x180/0x180 [ 267.962983] ? destroy_unused_super.part.6+0xd0/0xd0 [ 267.968092] ? check_same_owner+0x320/0x320 [ 267.972401] ? rcu_pm_notify+0xc0/0xc0 [ 267.976296] ? rcu_read_lock_sched_held+0x108/0x120 [ 267.981296] ? kmem_cache_alloc_trace+0x459/0x740 [ 267.986122] ? lock_downgrade+0x980/0x980 [ 267.990277] kernfs_mount_ns+0x13d/0x8b0 [ 267.994332] ? kernfs_super_ns+0x70/0x70 [ 267.998398] sysfs_mount+0xc2/0x1c0 [ 268.002013] ? sysfs_kill_sb+0x40/0x40 [ 268.005889] ? alloc_pages_current+0xbe/0x1e0 [ 268.010372] ? security_sb_copy_data+0x81/0xb0 [ 268.014941] mount_fs+0x66/0x2d0 [ 268.018303] vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.022872] ? may_umount+0xa0/0xa0 [ 268.026482] ? _raw_read_unlock+0x22/0x30 [ 268.030614] ? __get_fs_type+0x8a/0xc0 [ 268.034504] do_mount+0xea4/0x2bb0 [ 268.038044] ? copy_mount_string+0x40/0x40 [ 268.042262] ? rcu_pm_notify+0xc0/0xc0 [ 268.046152] ? copy_mount_options+0x5f/0x2e0 [ 268.050542] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.055541] ? kmem_cache_alloc_trace+0x459/0x740 [ 268.060376] ? kasan_check_write+0x14/0x20 [ 268.064594] ? _copy_from_user+0x99/0x110 [ 268.068735] ? copy_mount_options+0x1f7/0x2e0 [ 268.073227] SyS_mount+0xab/0x120 [ 268.076666] ? copy_mnt_ns+0xb30/0xb30 [ 268.080538] do_syscall_64+0x281/0x940 [ 268.084405] ? __do_page_fault+0xc90/0xc90 [ 268.088620] ? _raw_spin_unlock_irq+0x27/0x70 [ 268.093099] ? finish_task_switch+0x1c1/0x7e0 [ 268.097578] ? syscall_return_slowpath+0x550/0x550 [ 268.102493] ? syscall_return_slowpath+0x2ac/0x550 [ 268.107406] ? prepare_exit_to_usermode+0x350/0x350 [ 268.112406] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 268.117763] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.122601] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.127771] RIP: 0033:0x4548b9 [ 268.130941] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.138633] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 268.145883] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 268.153133] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 268.160385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 268.167635] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 268.174920] CPU: 1 PID: 5544 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #40 [ 268.182102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.191449] Call Trace: [ 268.194035] dump_stack+0x194/0x24d [ 268.197667] ? arch_local_irq_restore+0x53/0x53 [ 268.202335] ? perf_event_alloc+0x1705/0x2b00 [ 268.206849] should_fail+0x8c0/0xa40 [ 268.210569] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.215667] ? SYSC_perf_event_open+0x12ca/0x2e00 [ 268.220540] ? find_held_lock+0x35/0x1d0 [ 268.224605] ? __lock_is_held+0xb6/0x140 [ 268.228689] ? check_same_owner+0x320/0x320 [ 268.233016] ? trace_hardirqs_on+0xd/0x10 [ 268.237164] ? perf_lock_task_context+0x486/0x9e0 [ 268.242004] ? rcu_note_context_switch+0x710/0x710 [ 268.246933] ? _raw_spin_unlock+0x22/0x30 [ 268.251090] should_failslab+0xec/0x120 [ 268.255068] kmem_cache_alloc_trace+0x4b/0x740 [ 268.259666] alloc_perf_context+0x4c/0xe0 [ 268.263813] find_get_context.isra.82+0x16f/0x670 [ 268.268662] ? perf_pin_task_context+0x120/0x120 [ 268.273413] ? ptrace_getsiginfo+0x190/0x190 [ 268.277816] ? get_unused_fd_flags+0x121/0x190 [ 268.282405] SYSC_perf_event_open+0xd1c/0x2e00 [ 268.286976] ? find_held_lock+0x35/0x1d0 [ 268.291060] ? perf_event_set_output+0x5a0/0x5a0 [ 268.295824] ? __sb_end_write+0xa0/0xd0 [ 268.299819] ? SyS_read+0x220/0x220 [ 268.303459] SyS_perf_event_open+0x39/0x50 [ 268.307692] ? perf_bp_event+0x2e0/0x2e0 [ 268.311758] do_syscall_64+0x281/0x940 [ 268.315647] ? trace_event_raw_event_sys_exit+0x260/0x260 2018/03/29 10:21:14 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000001380)={&(0x7f0000000d40)=@rc={0x1f, {0xeb5, 0xfffffffffffffffa, 0x9, 0x3, 0x9, 0x100000001}, 0x7fff}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000dc0)="24f04e3bcc691b3ef320d7c0936352d92ae423cc1e148d61b83cb738a97cf5f619ee246ae140e769fef2f4b003a511589b9f0f3663f604b7a028bdf1931199c234802bd04aec956a534141672fc4ddb67a4851ef938b552289b0d824a026f2b026a43516727a51e40d00a991663e2d47e39cea2c3df5d6b483d1351684eb755a209c37e319d27d0c909c2dc75e01d5adc0aa90449826f4f08c1fc0cf9984d355917f23fc441e5d04c6bd4c6bfc495375a004a7f6f58b146923069e90e9e157abac135de6b0cdc5", 0xc7}, {&(0x7f0000000ec0)="bbd8ee3208726a469b4f6ea23292966093c9b00211f95170fef5251b351bf26aa58b3bf58593ddb1d7ebfc28ef5cef004ef3e813edb86bdfaa639fce0af62923494aa6d1e65df6b2bd2d9254c9b060", 0x4f}], 0x2, &(0x7f00000019c0)=ANY=[@ANYBLOB="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"], 0x400}, 0x40000) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000010c0)={0xffffffff, 0x5, 0x10}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000001100)={&(0x7f0000001080)='./file0/file0\x00', r2}, 0x10) r3 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001140)) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x8, 0x17, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000040000000000002b04000087b0feff10000000000000feffffffff940000000000000000000000000089235620ba2985a1ffff001385ac3b000000090520001f0000000000000000000000fd4afeffffffffff0000000000e3ffff840000001000000000000000000000001800005104000000000000000000000028a1f1ff0000000000000000000500005502d000fce6ffff00000000000000e8852df4fff0ffffff00000000000000009500000000000000169d0073b9480e4ea0550c5b5e5e473b5d8e71f439f90d9835878c"], &(0x7f0000001480)='syzkaller\x00', 0x80000000, 0xd7, &(0x7f00000014c0)=""/215, 0x41000, 0x1}, 0x48) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) gettid() recvmsg$kcm(r3, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000001180)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000480)='\x00') [ 268.321182] ? syscall_return_slowpath+0x550/0x550 [ 268.326101] ? syscall_return_slowpath+0x2ac/0x550 [ 268.331027] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 268.336379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.341218] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.346393] RIP: 0033:0x4548b9 [ 268.349570] RSP: 002b:00007fdb8f3f9c68 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 268.357275] RAX: ffffffffffffffda RBX: 00007fdb8f3fa6d4 RCX: 00000000004548b9 [ 268.364535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020348f88 2018/03/29 10:21:14 executing program 2 (fault-call:1 fault-nth:29): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:14 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) [ 268.371792] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 268.379043] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000015 [ 268.386292] R13: 0000000000000458 R14: 00000000006f88e0 R15: 0000000000000001 2018/03/29 10:21:14 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x0, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:14 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:14 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0xec4, 0x401, 0x8, 0x55, 0x0, 0x4, 0x21400, 0xf, 0x2, 0x9, 0x101, 0x3, 0x200, 0xfffffffffffffffb, 0x3, 0x2, 0x7, 0xb41, 0x0, 0xaa, 0x3, 0x7, 0x8001, 0x5, 0x1, 0x7ff, 0x80000, 0x8, 0x6, 0x1, 0x738, 0xde, 0x3, 0xfffffffffffffff2, 0x6, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x10000, 0x4}, 0x2, 0x8c, 0x8, 0x4, 0x8, 0x2}, 0x0, 0x1, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000080)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000140)='..', 0x0, 0x10}, 0x10) [ 268.443593] FAULT_INJECTION: forcing a failure. [ 268.443593] name failslab, interval 1, probability 0, space 0, times 0 [ 268.454870] CPU: 1 PID: 5567 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 268.462051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.471383] Call Trace: [ 268.473955] dump_stack+0x194/0x24d [ 268.477568] ? arch_local_irq_restore+0x53/0x53 [ 268.482218] ? finish_task_switch+0x1c1/0x7e0 [ 268.486696] ? finish_task_switch+0x182/0x7e0 [ 268.491192] should_fail+0x8c0/0xa40 [ 268.494896] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.499994] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.504749] ? __sched_text_start+0x8/0x8 [ 268.508875] ? find_held_lock+0x35/0x1d0 [ 268.512928] ? __lock_is_held+0xb6/0x140 [ 268.516998] ? check_same_owner+0x320/0x320 [ 268.521333] should_failslab+0xec/0x120 [ 268.525311] kmem_cache_alloc_trace+0x4b/0x740 [ 268.529875] ? __kmalloc_node+0x33/0x70 [ 268.533824] ? __kmalloc_node+0x33/0x70 [ 268.537780] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.542789] __memcg_init_list_lru_node+0x169/0x270 [ 268.547795] ? list_lru_add+0x7c0/0x7c0 [ 268.551749] ? __kmalloc_node+0x47/0x70 [ 268.555723] __list_lru_init+0x544/0x750 [ 268.559778] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 268.565647] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 268.570659] ? lockdep_init_map+0x9/0x10 [ 268.574711] sget_userns+0x6b1/0xe40 [ 268.578404] ? kernfs_sop_show_path+0x190/0x190 [ 268.583065] ? kernfs_sop_show_options+0x180/0x180 [ 268.587977] ? destroy_unused_super.part.6+0xd0/0xd0 [ 268.593083] ? check_same_owner+0x320/0x320 [ 268.597385] ? rcu_pm_notify+0xc0/0xc0 [ 268.601278] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.606274] ? kmem_cache_alloc_trace+0x459/0x740 [ 268.611096] ? lock_downgrade+0x980/0x980 [ 268.615243] kernfs_mount_ns+0x13d/0x8b0 [ 268.619294] ? kernfs_super_ns+0x70/0x70 [ 268.623360] sysfs_mount+0xc2/0x1c0 [ 268.626967] ? sysfs_kill_sb+0x40/0x40 [ 268.630836] ? alloc_pages_current+0xbe/0x1e0 [ 268.635317] ? security_sb_copy_data+0x81/0xb0 [ 268.639888] mount_fs+0x66/0x2d0 [ 268.643246] vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.647813] ? may_umount+0xa0/0xa0 [ 268.651418] ? _raw_read_unlock+0x22/0x30 [ 268.655547] ? __get_fs_type+0x8a/0xc0 [ 268.659432] do_mount+0xea4/0x2bb0 [ 268.662971] ? copy_mount_string+0x40/0x40 [ 268.667187] ? rcu_pm_notify+0xc0/0xc0 [ 268.671077] ? copy_mount_options+0x5f/0x2e0 [ 268.675474] ? rcu_read_lock_sched_held+0x108/0x120 [ 268.680470] ? kmem_cache_alloc_trace+0x459/0x740 [ 268.685297] ? kasan_check_write+0x14/0x20 [ 268.689509] ? _copy_from_user+0x99/0x110 [ 268.693649] ? copy_mount_options+0x1f7/0x2e0 [ 268.698136] SyS_mount+0xab/0x120 [ 268.701566] ? copy_mnt_ns+0xb30/0xb30 [ 268.705437] do_syscall_64+0x281/0x940 [ 268.709304] ? __do_page_fault+0xc90/0xc90 [ 268.713519] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 268.719040] ? syscall_return_slowpath+0x550/0x550 [ 268.724040] ? syscall_return_slowpath+0x2ac/0x550 [ 268.728959] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 268.734315] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.739152] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 10:21:14 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:14 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 268.744319] RIP: 0033:0x4548b9 [ 268.747487] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.755176] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 268.762421] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 268.769673] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 268.776922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 268.784171] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/29 10:21:14 executing program 2 (fault-call:1 fault-nth:30): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:15 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000400)) socketpair$packet(0x11, 0x2, 0x300, &(0x7f00000003c0)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000002c0)={r0, r3}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r2) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000380)) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 268.879451] FAULT_INJECTION: forcing a failure. [ 268.879451] name failslab, interval 1, probability 0, space 0, times 0 [ 268.890953] CPU: 1 PID: 5592 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 268.898143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.907489] Call Trace: [ 268.910083] dump_stack+0x194/0x24d [ 268.913750] ? arch_local_irq_restore+0x53/0x53 [ 268.918428] ? __save_stack_trace+0x7e/0xd0 [ 268.922750] should_fail+0x8c0/0xa40 2018/03/29 10:21:15 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 268.926462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.931560] ? kasan_kmalloc+0xad/0xe0 [ 268.935436] ? kmem_cache_alloc_trace+0x136/0x740 [ 268.940272] ? __memcg_init_list_lru_node+0x169/0x270 [ 268.945458] ? __list_lru_init+0x544/0x750 [ 268.949686] ? sget_userns+0x6b1/0xe40 [ 268.953576] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 268.958326] ? do_mount+0xea4/0x2bb0 [ 268.962030] ? SyS_mount+0xab/0x120 [ 268.965658] ? do_syscall_64+0x281/0x940 [ 268.969716] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 268.975090] ? find_held_lock+0x35/0x1d0 2018/03/29 10:21:15 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f00000008c0)}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) [ 268.979159] ? __lock_is_held+0xb6/0x140 [ 268.983252] ? check_same_owner+0x320/0x320 [ 268.987581] ? rcu_note_context_switch+0x710/0x710 [ 268.992532] should_failslab+0xec/0x120 [ 268.996503] kmem_cache_alloc_trace+0x4b/0x740 [ 269.001078] ? __kmalloc_node+0x33/0x70 [ 269.005044] ? __kmalloc_node+0x33/0x70 [ 269.009016] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.014046] __memcg_init_list_lru_node+0x169/0x270 [ 269.019077] ? list_lru_add+0x7c0/0x7c0 [ 269.023046] ? __kmalloc_node+0x47/0x70 [ 269.027032] __list_lru_init+0x544/0x750 [ 269.031107] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 269.037001] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 269.042031] ? lockdep_init_map+0x9/0x10 [ 269.046094] sget_userns+0x6b1/0xe40 [ 269.049802] ? kernfs_sop_show_path+0x190/0x190 [ 269.054474] ? kernfs_sop_show_options+0x180/0x180 [ 269.059404] ? destroy_unused_super.part.6+0xd0/0xd0 [ 269.064527] ? check_same_owner+0x320/0x320 [ 269.068848] ? rcu_pm_notify+0xc0/0xc0 [ 269.072759] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.077772] ? kmem_cache_alloc_trace+0x459/0x740 [ 269.082610] ? lock_downgrade+0x980/0x980 [ 269.086757] kernfs_mount_ns+0x13d/0x8b0 [ 269.090814] ? kernfs_super_ns+0x70/0x70 [ 269.094875] sysfs_mount+0xc2/0x1c0 [ 269.098481] ? sysfs_kill_sb+0x40/0x40 [ 269.102348] ? alloc_pages_current+0xbe/0x1e0 [ 269.106823] ? security_sb_copy_data+0x81/0xb0 [ 269.111388] mount_fs+0x66/0x2d0 [ 269.114736] vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.119300] ? may_umount+0xa0/0xa0 [ 269.122905] ? _raw_read_unlock+0x22/0x30 [ 269.127039] ? __get_fs_type+0x8a/0xc0 [ 269.130927] do_mount+0xea4/0x2bb0 [ 269.134454] ? copy_mount_string+0x40/0x40 [ 269.138667] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 269.143660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 269.148403] ? retint_kernel+0x10/0x10 [ 269.152280] ? copy_mount_options+0x18b/0x2e0 [ 269.156752] ? copy_mount_options+0x196/0x2e0 [ 269.161225] ? copy_mount_options+0x1f7/0x2e0 [ 269.165700] SyS_mount+0xab/0x120 [ 269.169130] ? copy_mnt_ns+0xb30/0xb30 [ 269.173008] do_syscall_64+0x281/0x940 [ 269.176882] ? __do_page_fault+0xc90/0xc90 [ 269.181090] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.185562] ? finish_task_switch+0x1c1/0x7e0 [ 269.190045] ? syscall_return_slowpath+0x550/0x550 [ 269.194968] ? syscall_return_slowpath+0x2ac/0x550 [ 269.199892] ? prepare_exit_to_usermode+0x350/0x350 [ 269.204900] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 269.210258] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.215092] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.220260] RIP: 0033:0x4548b9 [ 269.223428] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 10:21:15 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)) r1 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r1, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000480)='\x00') r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d40)={0x0, 0x7, 0x18}, 0xc) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000e80)={r3, &(0x7f0000000d80)="9ce6de2a7d43864a8829e409c7b4b53b0e9a0604a799314c892656e52f2f8d6c1242c630b83bab11258d68c9852adb0852c0b3aaa1fe536bcb1bdafee8fce83c33a3bde3fe45b75e62be790a4d6aa85092a138b225302edc501d60bd4643f287f959bda0b02d211c05fd3403f309c486da8adada0cab79c8b9a6d2c515a462322cd8ac8b6bc6f58a7650e018b2e8d1e36007638d5a314f52c0b78d76638874d9203c5f8f5901498c124f480808862b3f470b447a2a2343102c80ad9966765cb573a1b122b94c856d31713cccbec485f58df8939cc87321a1fad2eb18b987863fdb03f9eb801f66018c5bcae8f5bc"}, 0x10) 2018/03/29 10:21:15 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:15 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) getpid() sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) socketpair$inet(0x2, 0x8000f, 0x95, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 269.231123] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 269.238377] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 269.245630] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 269.252885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 269.260135] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/29 10:21:15 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:15 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) 2018/03/29 10:21:15 executing program 2 (fault-call:1 fault-nth:31): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) [ 269.358724] FAULT_INJECTION: forcing a failure. [ 269.358724] name failslab, interval 1, probability 0, space 0, times 0 [ 269.370058] CPU: 1 PID: 5651 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 269.377247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.386598] Call Trace: [ 269.389195] dump_stack+0x194/0x24d [ 269.392820] ? arch_local_irq_restore+0x53/0x53 [ 269.397472] ? __save_stack_trace+0x7e/0xd0 [ 269.401799] should_fail+0x8c0/0xa40 [ 269.405501] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.410585] ? kasan_kmalloc+0xad/0xe0 [ 269.414456] ? kmem_cache_alloc_trace+0x136/0x740 [ 269.419290] ? __memcg_init_list_lru_node+0x169/0x270 [ 269.424471] ? __list_lru_init+0x544/0x750 [ 269.428696] ? sget_userns+0x6b1/0xe40 [ 269.432585] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.437338] ? do_mount+0xea4/0x2bb0 [ 269.441046] ? SyS_mount+0xab/0x120 [ 269.444668] ? do_syscall_64+0x281/0x940 [ 269.448716] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.454079] ? find_held_lock+0x35/0x1d0 [ 269.458148] ? __lock_is_held+0xb6/0x140 [ 269.462212] ? check_same_owner+0x320/0x320 [ 269.466531] ? rcu_note_context_switch+0x710/0x710 [ 269.471477] should_failslab+0xec/0x120 [ 269.475452] kmem_cache_alloc_trace+0x4b/0x740 [ 269.480030] ? __kmalloc_node+0x33/0x70 [ 269.484001] ? __kmalloc_node+0x33/0x70 [ 269.487979] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.492981] __memcg_init_list_lru_node+0x169/0x270 [ 269.497982] ? list_lru_add+0x7c0/0x7c0 [ 269.501936] ? __kmalloc_node+0x47/0x70 [ 269.505900] __list_lru_init+0x544/0x750 [ 269.509948] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 269.515815] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 269.520839] ? lockdep_init_map+0x9/0x10 [ 269.524890] sget_userns+0x6b1/0xe40 [ 269.528601] ? kernfs_sop_show_path+0x190/0x190 [ 269.533272] ? kernfs_sop_show_options+0x180/0x180 [ 269.538202] ? destroy_unused_super.part.6+0xd0/0xd0 [ 269.543306] ? check_same_owner+0x320/0x320 [ 269.547612] ? rcu_pm_notify+0xc0/0xc0 [ 269.551488] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.556493] ? kmem_cache_alloc_trace+0x459/0x740 [ 269.561317] ? lock_downgrade+0x980/0x980 [ 269.565471] kernfs_mount_ns+0x13d/0x8b0 [ 269.569522] ? kernfs_super_ns+0x70/0x70 [ 269.573571] sysfs_mount+0xc2/0x1c0 [ 269.577182] ? sysfs_kill_sb+0x40/0x40 [ 269.581069] ? alloc_pages_current+0xbe/0x1e0 [ 269.585567] ? security_sb_copy_data+0x81/0xb0 [ 269.590143] mount_fs+0x66/0x2d0 [ 269.593498] vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.598064] ? may_umount+0xa0/0xa0 [ 269.601673] ? _raw_read_unlock+0x22/0x30 [ 269.605802] ? __get_fs_type+0x8a/0xc0 [ 269.609677] do_mount+0xea4/0x2bb0 [ 269.613206] ? copy_mount_string+0x40/0x40 [ 269.617436] ? rcu_pm_notify+0xc0/0xc0 [ 269.621319] ? copy_mount_options+0x5f/0x2e0 [ 269.625704] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.630706] ? kmem_cache_alloc_trace+0x459/0x740 [ 269.635528] ? kasan_check_write+0x14/0x20 [ 269.639741] ? _copy_from_user+0x99/0x110 [ 269.643870] ? copy_mount_options+0x1f7/0x2e0 [ 269.648353] SyS_mount+0xab/0x120 [ 269.651794] ? copy_mnt_ns+0xb30/0xb30 [ 269.655664] do_syscall_64+0x281/0x940 [ 269.659528] ? __do_page_fault+0xc90/0xc90 [ 269.663741] ? _raw_spin_unlock_irq+0x27/0x70 [ 269.668227] ? finish_task_switch+0x1c1/0x7e0 [ 269.672707] ? syscall_return_slowpath+0x550/0x550 [ 269.677622] ? syscall_return_slowpath+0x2ac/0x550 [ 269.682529] ? prepare_exit_to_usermode+0x350/0x350 [ 269.687540] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 269.692899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.697726] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.702891] RIP: 0033:0x4548b9 2018/03/29 10:21:15 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={0xffffffffffffffff, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, 0xffffffffffffffff, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:15 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f00000008c0)}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:15 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) r2 = perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x3, 0x7, 0x5, 0x40, 0x0, 0x9, 0x80, 0x4, 0x9, 0x8000, 0xbf, 0x2, 0x0, 0x8, 0x80, 0xeec, 0x1, 0x840c, 0x0, 0x6, 0x3, 0x6, 0x0, 0xb5, 0x400, 0x2f, 0xffffffff, 0x7, 0x8, 0x1, 0x4, 0x8000, 0x10000, 0xffff, 0x9, 0x9, 0x0, 0x10001, 0x4, @perf_config_ext={0x1, 0x7}, 0x1, 0x6, 0x400, 0x7, 0x8001, 0x3, 0x8}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x59eb8350, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r3, 0xa27d}, 0x2c) 2018/03/29 10:21:15 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980)}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x7) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) socketpair$inet6(0xa, 0x807, 0x4, &(0x7f0000000d40)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) recvmsg$kcm(r2, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000d80)=""/95, 0x5f}, {&(0x7f0000000e00)=""/243, 0xf3}, {&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f0000000f00)=""/211, 0xd3}, {&(0x7f0000001000)=""/144, 0x90}, {&(0x7f00000010c0)=""/61, 0x3d}], 0x7, 0x0, 0x0, 0xdae5}, 0x2000) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') 2018/03/29 10:21:15 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000380)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='../file0\x00', 0x0, 0x18}, 0x10) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:15 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) [ 269.706060] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.713746] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 269.720995] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 269.728256] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 269.735511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 269.742756] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:15 executing program 2 (fault-call:1 fault-nth:32): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:15 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r2, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000380)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) [ 269.838242] FAULT_INJECTION: forcing a failure. [ 269.838242] name failslab, interval 1, probability 0, space 0, times 0 [ 269.849637] CPU: 0 PID: 5683 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 269.856832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.866179] Call Trace: [ 269.868752] dump_stack+0x194/0x24d [ 269.872374] ? arch_local_irq_restore+0x53/0x53 [ 269.877031] ? __save_stack_trace+0x7e/0xd0 [ 269.881376] should_fail+0x8c0/0xa40 [ 269.885086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.890185] ? kasan_kmalloc+0xad/0xe0 [ 269.894071] ? kmem_cache_alloc_trace+0x136/0x740 [ 269.898910] ? __memcg_init_list_lru_node+0x169/0x270 [ 269.904081] ? __list_lru_init+0x544/0x750 [ 269.908289] ? sget_userns+0x6b1/0xe40 [ 269.912172] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 269.916921] ? do_mount+0xea4/0x2bb0 [ 269.920616] ? SyS_mount+0xab/0x120 [ 269.924224] ? do_syscall_64+0x281/0x940 [ 269.928259] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 269.933622] ? find_held_lock+0x35/0x1d0 [ 269.937676] ? __lock_is_held+0xb6/0x140 [ 269.941731] ? check_same_owner+0x320/0x320 [ 269.946036] ? rcu_note_context_switch+0x710/0x710 [ 269.950952] should_failslab+0xec/0x120 [ 269.954904] kmem_cache_alloc_trace+0x4b/0x740 [ 269.959461] ? __kmalloc_node+0x33/0x70 [ 269.963407] ? __kmalloc_node+0x33/0x70 [ 269.967361] ? rcu_read_lock_sched_held+0x108/0x120 [ 269.972363] __memcg_init_list_lru_node+0x169/0x270 [ 269.977359] ? list_lru_add+0x7c0/0x7c0 [ 269.981308] ? __kmalloc_node+0x47/0x70 [ 269.985267] __list_lru_init+0x544/0x750 [ 269.989314] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 269.995174] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 270.000176] ? lockdep_init_map+0x9/0x10 [ 270.004218] sget_userns+0x6b1/0xe40 [ 270.007908] ? kernfs_sop_show_path+0x190/0x190 [ 270.012559] ? kernfs_sop_show_options+0x180/0x180 [ 270.017466] ? destroy_unused_super.part.6+0xd0/0xd0 [ 270.022559] ? check_same_owner+0x320/0x320 [ 270.026859] ? rcu_pm_notify+0xc0/0xc0 [ 270.030735] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.035725] ? kmem_cache_alloc_trace+0x459/0x740 [ 270.040541] ? lock_downgrade+0x980/0x980 [ 270.044681] kernfs_mount_ns+0x13d/0x8b0 [ 270.048723] ? kernfs_super_ns+0x70/0x70 [ 270.052773] sysfs_mount+0xc2/0x1c0 [ 270.056376] ? sysfs_kill_sb+0x40/0x40 [ 270.060241] ? alloc_pages_current+0xbe/0x1e0 [ 270.064713] ? security_sb_copy_data+0x81/0xb0 [ 270.069276] mount_fs+0x66/0x2d0 [ 270.072623] vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.077186] ? may_umount+0xa0/0xa0 [ 270.080792] ? _raw_read_unlock+0x22/0x30 [ 270.084914] ? __get_fs_type+0x8a/0xc0 [ 270.088786] do_mount+0xea4/0x2bb0 [ 270.092316] ? copy_mount_string+0x40/0x40 [ 270.096528] ? rcu_pm_notify+0xc0/0xc0 [ 270.100408] ? copy_mount_options+0x5f/0x2e0 [ 270.104790] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.109782] ? kmem_cache_alloc_trace+0x459/0x740 [ 270.114730] ? copy_mount_options+0x1f7/0x2e0 [ 270.119206] SyS_mount+0xab/0x120 [ 270.122636] ? copy_mnt_ns+0xb30/0xb30 [ 270.126500] do_syscall_64+0x281/0x940 [ 270.130368] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 270.135881] ? syscall_return_slowpath+0x550/0x550 [ 270.140788] ? syscall_return_slowpath+0x2ac/0x550 [ 270.145699] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 270.151049] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.155875] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.161038] RIP: 0033:0x4548b9 [ 270.164213] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.173544] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 270.180791] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 270.188039] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 270.195288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 270.202533] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 2018/03/29 10:21:16 executing program 5: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r1}, 0x10) r3 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000480)=0x9) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r4, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r2, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x0, 0xffffffff, 0x9, 0xfffffffe, 0x4, r2, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r2, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r4, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r2}, 0x10) 2018/03/29 10:21:16 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r2, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r2, 0xa27d}, 0x2c) 2018/03/29 10:21:16 executing program 4: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001fc0)=""/129, 0x81}], 0x1, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000700)="d959086ec8c384917bb2fb6e16e07a6472f71c69afba0b51b0f4f1855b92a624663d7e3cdfeddc0140e72d238be7b3fdd12124b86007c950c1fd6c54377a77ae1506f329d6c46540dff8a9be83aad4c6705402830e4b5149d597408940593a198d0ff7f599eb197a9f86a8c199f18d9d0c7ddbe2af999a81e2f559c27f2921e51b810ab82d0f049fa4341d0234f0c2a07f414cd9833e40493b483ada5f87f33f17a9b8b281ab4d3c2c78a12590ffccccc1180bffd9d2283daac3acac3470ef71d4b78e1d758b6589e2e40b79031f9742437aabfe156863484b7f310b91cde07dcc2ed1d58b", 0xe5}], 0x1, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x0) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000800)="afea29569fa4e8cc702d085c81a37deed3ba9df4370ee251477d84d8e89e010628620b5c6afcc9d2be26cfe85603f0860ed23301dd69ba5109b5e12ef650256988c2c2c7dd04cba05f7825e21037dc8094f735f949d97758d644ede6e89598c75169073e6b4ae9b7e3b91052e7f9518e747eb18bb3e8a5636ec19d6776f1e865f8eb21523048169303cbb5102ef8735561f605981406eb36478b8e6516529d5c", 0xa0}, {&(0x7f00000008c0)="6f18911d112535be8c6681da718159e3d52a035cdb6fbc720d882160ec9ced0200481fd0f69d6b93a55cc18b5dc9c19f4ad87ff7f10cb3dda46b946ada707ce5705f0adcfd0f90686a82e14ee8aadab0d82645098c6614", 0x57}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x6, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:16 executing program 1: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) socketpair(0x13, 0x5, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r0, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f00000008c0)}, {&(0x7f0000000940)="f25a8e632ddce4bc3dbdd3de642030f33a34414a6eb77067e0fa0b3393312fa06fcfc4358889ae0054b0d8487983e0b260330afba904aa5274b6c3d185df387fd841a58335d24d4eac3caf813142fc8abcfc24f2b1f88857ee02d3c64c0202a353550d7bcb86be65630d70c8a10a6509dbe8c1d67c416df9eb6916acd7d594f3e7b087dfe0511be480d091f6968113a2aeee13b8b794361a45a80a3984094d0e7c0560b089b3047fb6d5f4a46495c5f5e0b1b09b6a7a094637974dd0589b233d3a90e324ac50e32e94454469982093ea104a1391", 0xd4}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b0311003138254b8c89e737de0ae07953c9b71b2e84c96b1a7a0cc82ca2a2dc82bde37c4d6c1083234298e3be2abba9c869982f16f14046b5afda", 0x69}, {&(0x7f0000000500)="b5dda5186d4c12db9fed87e331321c09c22c3fb06a4b1d95", 0x18}], 0x5, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:16 executing program 7: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1f, 0x8, 0xff, 0xfb, 0x16, 0x1, 0x72}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r2, 0x28, &(0x7f0000000140)}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000002180)={&(0x7f0000001e40)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000002080)=[{&(0x7f0000001ec0)=""/237, 0xed}, {&(0x7f0000001fc0)=""/129, 0x81}], 0x2, &(0x7f00000020c0)=""/130, 0x82, 0xfffffffffffffff7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..'}, 0x10) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000480)=0x9) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r3, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b783bd21777f0f3d4dbce2ea18b8f00942b3bf6c28162a32b2d73fc43ee052a6d2d", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000380)=r6, 0x4) socketpair(0x8, 0x80000, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r7, 0x6, 0x1}, 0x14) close(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={0xffffffffffffffff, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) 2018/03/29 10:21:16 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0xde58c2b87c64bb49, 0x494, 0x8, 0x5, 0x2, 0xffffffffffffffff, 0xe42}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000003c0)={r0, &(0x7f0000000700)="ad9ba082862c2ead6703e64c0a3958ed58e0b25f949e4cc6b95bcd6cb1c82f58da47059326ac13c2c3b410833f7373812aebfc6ce973bbea0dc0ebd059f3d9eb076fcbe0ad2a53990ef0448fd6df6004404cc42bf9dad11a3185cf9d146e55b0ff85007a7f759deb03371c6d8248f7acb69be9a8ba6dd0dce6c50f2051a51c6d156f49c9058e42ce3e07f7bd707184a1d91913c916d2be36228b3c423e781ff303602eb8299d61a98b91c978ab7e30b8dd8328e42f57117923d4b0550da3d46f", &(0x7f00000007c0)="d34f97366ea43a5f8e506ee986e9c16a4ad9a5ea93f4c41d2b9c69a4bb6f181f7ae9a54ea28e0019bc0d616eae9ceafac08740ea2f1e402c5896a9f3fb47eedf5b27f74c83936197a8c7d8ec6c473bb8fac57959287c328ab683befafb670ce71da5d97d664ca606253053e5b09a577fc44f7dc6bb017549d1d16ecb5673cd8d2c966bfdf0fc6364bee41acc9d71e8359fea938f0b971bf7ee0d1f232cdbadc4f7a2a14352beeeb3cc8120967309c2abfb25af61e736", 0x1}, 0x20) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000021c0)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair(0x13, 0x0, 0x9, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000100)='..', r2}, 0x10) r4 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x9) recvmsg$kcm(r3, &(0x7f0000001e00)={&(0x7f0000000b40)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast2}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)}, {&(0x7f0000000c80)=""/30, 0x1e}, {&(0x7f0000000cc0)=""/4096, 0x1000}], 0x4, &(0x7f0000001d00)=""/233, 0xe9, 0x4}, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000fc9000)={0x1, 0x6, 0x209e1f, 0x8000000001}, 0x2c) sendmsg(r1, &(0x7f0000e91000)={0x0, 0x0, &(0x7f00001cd000), 0x0, &(0x7f0000298000)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)=@ax25={0x3, {"d16b45a24bbbd6"}, 0x4}, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000680), 0x0, 0x870f7822e69b9740}, 0x8080) close(r4) mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='devpts\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000002c0)) socketpair$inet6(0xa, 0x3, 0x20, &(0x7f0000000400)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r5, &(0x7f0000000240)="98528f5089c5607f21fb352c37e893003f9213dedd7f602f4ffa279f7703784242b787c5ed8c140647d6f4c3d27c2e5c16c07cb6a46b8eab64bf72677243920a9bdb45b7bca03997329935dc5a225ca8fe82ef685a58d5bb0d7a5809594f80454c3f7b", &(0x7f0000000300)=""/39}, 0x18) socketpair$inet(0x2, 0x8000a, 0x1, &(0x7f0000000440)) sendmsg(r3, &(0x7f0000000580)={&(0x7f0000000600)=@in6={0xa, 0x4e22, 0x9c, @dev={0xfe, 0x80, [], 0xb}, 0x8}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000680)="12e0420023d32b091785ebf09bda3671470b973b15eb9739686e9a384e2c0ce68b1578efae66b31dbaece492e10f81169c8f6e6c3556aa6655aa9b1dc44768892b36c412ac53e38aeaeb9a2c3578cf46ca5ed95afe7762c51b", 0x59}, {&(0x7f0000000a40)="5eb857506a1df1ae979baa9c058aced369d6b5b4743f44bce213e3125a9631f6658f68473e2b04b389119ecc30fa0b031100313825", 0x35}], 0x2, 0x0, 0x0, 0x4008000}, 0x4000001) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)={0x11, 0xffffffff, 0x9, 0xfffffffe, 0x4, r3, 0x8}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x2034) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000002240)={r3, 0x28, &(0x7f0000002200)}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c40)={0x4, 0x9, 0x9, 0x4, 0x0, r5, 0xa27d}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', r3}, 0x10) 2018/03/29 10:21:16 executing program 2 (fault-call:1 fault-nth:33): mkdir(&(0x7f00000014c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='sysfs\x00', 0x0, &(0x7f0000000180)) mount(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/bus\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000280)) mount(&(0x7f0000000180)='./file0/bus\x00', &(0x7f0000000240)='./file0/bus\x00', &(0x7f0000000280)='ufs\x00', 0x0, 0x0) mount(&(0x7f0000000d00)='./file1\x00', &(0x7f0000000d40)='./file0/bus\x00', &(0x7f0000000d80)='aio\x00', 0x20, &(0x7f0000000dc0)) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x2000000004, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x1, [0x4]}, 0x2c) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0), 0xc) 2018/03/29 10:21:16 executing program 6: sendmsg(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea5", 0x24}], 0x1, &(0x7f0000000980), 0x399}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000780)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000006c0)=""/139}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x7, 0x2, &(0x7f00000003c0)=@raw=[@exit={0x95}], &(0x7f0000000440)="e7ec95457b80a7ce93cd589466f84973fb76577e697126e971ad565c00", 0x40, 0x42, &(0x7f0000001880)=""/66, 0x41000, 0x1}, 0x48) socketpair$inet(0x2, 0x6, 0x1, &(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x0, &(0x7f0000000100)) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000004c0)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000380)='bdev\x00', 0x4, &(0x7f0000000500)) sendmsg$kcm(r2, &(0x7f0000000f40)={&(0x7f0000000d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x2, 0x0, 0x3, 0x4, {0xa, 0x4e20, 0x1, @remote={0xfe, 0x80, [], 0xbb}, 0x1ff}}}, 0x80, &(0x7f0000000f00)=[{&(0x7f0000000e00)="1670b8c917e41b20a3f8e98f58029f11d994f5a79da7a19f986daea74f44e3bab13b443d87c359ca9c241ca925b8e05cd6d32710a8191c97a19968cd36545e2e01e4ca8f3033bfefad7586eeb098536952cb097d90f73bef4f5e0291d992e8f39f9ccfc25016d65bd21fda0c6b4ff12686cc5abf0fb9a791f4b1db2f70cb1430a5ecd72ccd064532f9d1625578d00649920a7f22cf848019df97902bef343170c6f8c725f2036584a7f88684c1197007341d3326a22acb1b0d74e232a4d227d8f5c47440fba50ae777c07f4d", 0xcc}], 0x1, &(0x7f00000019c0)=[{0x1010, 0x10a, 0x3, "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"}], 0x1010, 0x4}, 0x20000054) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x20000, &(0x7f00000000c0)) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000500)=@nfc_llcp, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)=""/87, 0x57}, {&(0x7f0000000600)=""/121, 0x79}, {&(0x7f0000000800)=""/116, 0x74}, {&(0x7f0000000980)=""/236, 0xec}, {&(0x7f0000000880)=""/151, 0x97}, {&(0x7f0000000a80)=""/251, 0xfb}], 0x6, &(0x7f0000000c00)=""/168, 0xa8, 0x8}, 0x40000000) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000480)='\x00') bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000d40)=0x7, 0x4) [ 270.365717] FAULT_INJECTION: forcing a failure. [ 270.365717] name failslab, interval 1, probability 0, space 0, times 0 [ 270.377202] CPU: 1 PID: 5730 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 270.384380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.393715] Call Trace: [ 270.396287] dump_stack+0x194/0x24d [ 270.399902] ? arch_local_irq_restore+0x53/0x53 [ 270.404558] ? find_held_lock+0x35/0x1d0 [ 270.408621] should_fail+0x8c0/0xa40 [ 270.412314] ? __list_lru_init+0x352/0x750 [ 270.416540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.421622] ? find_first_zero_bit+0x93/0xe0 [ 270.426051] ? find_held_lock+0x35/0x1d0 [ 270.430104] ? __lock_is_held+0xb6/0x140 [ 270.434177] ? check_same_owner+0x320/0x320 [ 270.438484] ? rcu_note_context_switch+0x710/0x710 [ 270.443393] ? find_held_lock+0x35/0x1d0 [ 270.447447] should_failslab+0xec/0x120 [ 270.451401] __kmalloc+0x63/0x760 [ 270.454831] ? lock_downgrade+0x980/0x980 [ 270.458962] ? _raw_spin_unlock+0x22/0x30 [ 270.463099] ? register_shrinker+0x10e/0x2d0 [ 270.467485] ? trace_event_raw_event_module_request+0x320/0x320 [ 270.473537] register_shrinker+0x10e/0x2d0 [ 270.477757] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 270.483542] ? memcpy+0x45/0x50 [ 270.486818] sget_userns+0xbbf/0xe40 [ 270.490512] ? kernfs_sop_show_path+0x190/0x190 [ 270.495177] ? kernfs_sop_show_options+0x180/0x180 [ 270.500089] ? destroy_unused_super.part.6+0xd0/0xd0 [ 270.505195] ? check_same_owner+0x320/0x320 [ 270.509498] ? rcu_pm_notify+0xc0/0xc0 [ 270.513392] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.518387] ? kmem_cache_alloc_trace+0x459/0x740 [ 270.523210] ? lock_downgrade+0x980/0x980 [ 270.527365] kernfs_mount_ns+0x13d/0x8b0 [ 270.531411] ? kernfs_super_ns+0x70/0x70 [ 270.535474] sysfs_mount+0xc2/0x1c0 [ 270.539085] ? sysfs_kill_sb+0x40/0x40 [ 270.542957] ? alloc_pages_current+0xbe/0x1e0 [ 270.547440] ? security_sb_copy_data+0x81/0xb0 [ 270.552008] mount_fs+0x66/0x2d0 [ 270.555369] vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.559935] ? may_umount+0xa0/0xa0 [ 270.563541] ? _raw_read_unlock+0x22/0x30 [ 270.567669] ? __get_fs_type+0x8a/0xc0 [ 270.571550] do_mount+0xea4/0x2bb0 [ 270.575099] ? copy_mount_string+0x40/0x40 [ 270.579318] ? rcu_pm_notify+0xc0/0xc0 [ 270.583207] ? copy_mount_options+0x5f/0x2e0 [ 270.587595] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.592589] ? kmem_cache_alloc_trace+0x459/0x740 [ 270.597419] ? kasan_check_write+0x14/0x20 [ 270.601633] ? _copy_from_user+0x99/0x110 [ 270.605775] ? copy_mount_options+0x1f7/0x2e0 [ 270.610262] SyS_mount+0xab/0x120 [ 270.613692] ? copy_mnt_ns+0xb30/0xb30 [ 270.617567] do_syscall_64+0x281/0x940 [ 270.621432] ? __do_page_fault+0xc90/0xc90 [ 270.625640] ? _raw_spin_unlock_irq+0x27/0x70 [ 270.630115] ? finish_task_switch+0x1c1/0x7e0 [ 270.634592] ? syscall_return_slowpath+0x550/0x550 [ 270.639523] ? syscall_return_slowpath+0x2ac/0x550 [ 270.644434] ? prepare_exit_to_usermode+0x350/0x350 [ 270.649432] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 270.654789] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.659625] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 270.664794] RIP: 0033:0x4548b9 [ 270.667960] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.675654] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 270.682905] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 270.690151] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 270.697397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 270.704645] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 270.737920] kasan: CONFIG_KASAN_INLINE enabled [ 270.742969] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 270.750401] general protection fault: 0000 [#1] SMP KASAN [ 270.755926] Dumping ftrace buffer: [ 270.759448] (ftrace buffer empty) [ 270.763135] Modules linked in: [ 270.766305] CPU: 1 PID: 5730 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #40 [ 270.773459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.782793] RIP: 0010:__list_del_entry_valid+0x7e/0x150 [ 270.788127] RSP: 0018:ffff8801b4b87658 EFLAGS: 00010246 [ 270.793461] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 270.800704] RDX: 0000000000000000 RSI: ffff8801d6dc1a18 RDI: ffff8801d6dc1a20 [ 270.807946] RBP: ffff8801b4b87670 R08: ffffffff81d558f2 R09: 0000000000000004 [ 270.815363] R10: ffff8801b4b87670 R11: 0000000000000000 R12: 0000000000000000 [ 270.822604] R13: ffff8801b7c1a980 R14: ffff8801b4b87700 R15: ffff8801d6dc1a18 [ 270.829849] FS: 00007fd4873f5700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 [ 270.838045] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 270.843900] CR2: 000000000047ffb0 CR3: 00000001ae41a006 CR4: 00000000001606e0 [ 270.851147] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 270.858389] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 270.865631] Call Trace: [ 270.868198] ? mutex_lock_nested+0x16/0x20 [ 270.872409] kernfs_kill_sb+0x9e/0x330 [ 270.876271] ? unregister_shrinker+0x22c/0x3a0 [ 270.880825] ? kernfs_mount_ns+0x8b0/0x8b0 [ 270.885039] ? perf_trace_mm_vmscan_writepage+0x790/0x790 [ 270.890550] ? register_shrinker+0x235/0x2d0 [ 270.894935] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 270.900711] sysfs_kill_sb+0x22/0x40 [ 270.904400] deactivate_locked_super+0x88/0xd0 [ 270.908954] sget_userns+0xbda/0xe40 [ 270.912639] ? kernfs_sop_show_path+0x190/0x190 [ 270.917284] ? kernfs_sop_show_options+0x180/0x180 [ 270.922185] ? destroy_unused_super.part.6+0xd0/0xd0 [ 270.927272] ? check_same_owner+0x320/0x320 [ 270.931568] ? rcu_pm_notify+0xc0/0xc0 [ 270.935439] ? rcu_read_lock_sched_held+0x108/0x120 [ 270.940428] ? kmem_cache_alloc_trace+0x459/0x740 [ 270.945243] ? lock_downgrade+0x980/0x980 [ 270.949371] kernfs_mount_ns+0x13d/0x8b0 [ 270.953407] ? kernfs_super_ns+0x70/0x70 [ 270.957449] sysfs_mount+0xc2/0x1c0 [ 270.961049] ? sysfs_kill_sb+0x40/0x40 [ 270.964910] ? alloc_pages_current+0xbe/0x1e0 [ 270.969381] ? security_sb_copy_data+0x81/0xb0 [ 270.973940] mount_fs+0x66/0x2d0 [ 270.977283] vfs_kern_mount.part.26+0xc6/0x4a0 [ 270.981839] ? may_umount+0xa0/0xa0 [ 270.985439] ? _raw_read_unlock+0x22/0x30 [ 270.989593] ? __get_fs_type+0x8a/0xc0 [ 270.993460] do_mount+0xea4/0x2bb0 [ 270.996985] ? copy_mount_string+0x40/0x40 [ 271.001195] ? rcu_pm_notify+0xc0/0xc0 [ 271.005067] ? copy_mount_options+0x5f/0x2e0 [ 271.009447] ? rcu_read_lock_sched_held+0x108/0x120 [ 271.014440] ? kmem_cache_alloc_trace+0x459/0x740 [ 271.019260] ? kasan_check_write+0x14/0x20 [ 271.023481] ? _copy_from_user+0x99/0x110 [ 271.027608] ? copy_mount_options+0x1f7/0x2e0 [ 271.032080] SyS_mount+0xab/0x120 [ 271.035505] ? copy_mnt_ns+0xb30/0xb30 [ 271.039368] do_syscall_64+0x281/0x940 [ 271.043229] ? __do_page_fault+0xc90/0xc90 [ 271.047434] ? _raw_spin_unlock_irq+0x27/0x70 [ 271.051903] ? finish_task_switch+0x1c1/0x7e0 [ 271.056375] ? syscall_return_slowpath+0x550/0x550 [ 271.061280] ? syscall_return_slowpath+0x2ac/0x550 [ 271.066184] ? prepare_exit_to_usermode+0x350/0x350 [ 271.071174] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 271.076517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.081340] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 271.086501] RIP: 0033:0x4548b9 [ 271.089663] RSP: 002b:00007fd4873f4c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 271.097345] RAX: ffffffffffffffda RBX: 00007fd4873f56d4 RCX: 00000000004548b9 [ 271.104588] RDX: 0000000020000140 RSI: 0000000020000100 RDI: 00000000200000c0 [ 271.111832] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 271.119076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 271.126320] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 271.133575] Code: 00 00 00 00 ad de 49 39 c4 74 66 48 b8 00 02 00 00 00 00 ad de 48 89 da 48 39 c3 74 65 48 c1 ea 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 02 00 75 7b 48 8b 13 48 39 f2 75 57 49 8d 7c 24 08 48 b8 [ 271.152717] RIP: __list_del_entry_valid+0x7e/0x150 RSP: ffff8801b4b87658 [ 271.159685] ---[ end trace 2a13ddce3a26ff2d ]--- [ 271.164468] Kernel panic - not syncing: Fatal exception [ 271.170272] Dumping ftrace buffer: [ 271.173793] (ftrace buffer empty) [ 271.177473] Kernel Offset: disabled [ 271.181079] Rebooting in 86400 seconds..