888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:25 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:25 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 937.474811] FAULT_INJECTION: forcing a failure. [ 937.474811] name failslab, interval 1, probability 0, space 0, times 0 [ 937.486132] CPU: 0 PID: 14345 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 937.493395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.502732] Call Trace: [ 937.505314] dump_stack+0x194/0x24d [ 937.508939] ? arch_local_irq_restore+0x53/0x53 [ 937.513600] ? __save_stack_trace+0x7e/0xd0 [ 937.517912] should_fail+0x8c0/0xa40 [ 937.521611] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 937.526689] ? kasan_kmalloc+0xad/0xe0 [ 937.530551] ? kmem_cache_alloc_trace+0x136/0x740 [ 937.535377] ? __memcg_init_list_lru_node+0x169/0x270 [ 937.540550] ? __list_lru_init+0x544/0x750 [ 937.544758] ? sget_userns+0x6b1/0xe40 [ 937.548630] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 937.553362] ? do_mount+0xea4/0x2bb0 [ 937.557097] ? SyS_mount+0xab/0x120 [ 937.560707] ? do_syscall_64+0x281/0x940 [ 937.564752] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 937.570093] ? find_held_lock+0x35/0x1d0 [ 937.574126] ? __lock_is_held+0xb6/0x140 [ 937.578162] ? check_same_owner+0x320/0x320 [ 937.582463] ? rcu_note_context_switch+0x710/0x710 [ 937.587368] should_failslab+0xec/0x120 [ 937.591322] kmem_cache_alloc_trace+0x4b/0x740 [ 937.595897] ? __kmalloc_node+0x33/0x70 [ 937.599851] ? __kmalloc_node+0x33/0x70 [ 937.603802] ? rcu_read_lock_sched_held+0x108/0x120 [ 937.608805] __memcg_init_list_lru_node+0x169/0x270 [ 937.613808] ? list_lru_add+0x7c0/0x7c0 [ 937.617761] ? __kmalloc_node+0x47/0x70 [ 937.621718] __list_lru_init+0x544/0x750 [ 937.625756] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 937.631616] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 937.636610] ? lockdep_init_map+0x9/0x10 [ 937.640659] sget_userns+0x6b1/0xe40 [ 937.644351] ? set_anon_super+0x20/0x20 [ 937.648298] ? put_filp+0x90/0x90 [ 937.651734] ? destroy_unused_super.part.6+0xd0/0xd0 [ 937.656817] ? alloc_vfsmnt+0x762/0x9c0 [ 937.660769] ? path_lookupat+0x238/0xba0 [ 937.664808] ? mnt_free_id.isra.21+0x50/0x50 [ 937.669206] ? trace_hardirqs_off+0x10/0x10 [ 937.673598] ? putname+0xee/0x130 [ 937.677036] ? cap_capable+0x1b5/0x230 [ 937.680902] ? security_capable+0x8e/0xc0 [ 937.685030] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 937.690194] ? ns_capable_common+0xcf/0x160 [ 937.694498] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 937.699672] mount_ns+0x6d/0x190 [ 937.703022] rpc_mount+0x9e/0xd0 [ 937.706366] mount_fs+0x66/0x2d0 [ 937.709705] vfs_kern_mount.part.26+0xc6/0x4a0 [ 937.714269] ? may_umount+0xa0/0xa0 [ 937.717876] ? _raw_read_unlock+0x22/0x30 [ 937.722001] ? __get_fs_type+0x8a/0xc0 [ 937.725869] do_mount+0xea4/0x2bb0 [ 937.729382] ? __might_fault+0x110/0x1d0 [ 937.733415] ? copy_mount_string+0x40/0x40 [ 937.737624] ? check_same_owner+0x320/0x320 [ 937.741928] ? __check_object_size+0x8b/0x530 [ 937.746396] ? __might_sleep+0x95/0x190 [ 937.750353] ? kasan_check_write+0x14/0x20 [ 937.754562] ? _copy_from_user+0x99/0x110 [ 937.758695] ? memdup_user+0x5e/0x90 [ 937.762383] ? copy_mount_options+0x1f7/0x2e0 [ 937.766855] SyS_mount+0xab/0x120 [ 937.770289] ? copy_mnt_ns+0xb30/0xb30 [ 937.774151] do_syscall_64+0x281/0x940 [ 937.778019] ? vmalloc_sync_all+0x30/0x30 [ 937.782150] ? _raw_spin_unlock_irq+0x27/0x70 [ 937.786626] ? finish_task_switch+0x1c1/0x7e0 [ 937.791100] ? syscall_return_slowpath+0x550/0x550 [ 937.796004] ? syscall_return_slowpath+0x2ac/0x550 [ 937.800912] ? prepare_exit_to_usermode+0x350/0x350 [ 937.805906] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 937.811243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 937.816060] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 937.821222] RIP: 0033:0x454e79 [ 937.824385] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 937.832065] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 937.839308] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 937.846549] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 937.853792] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 937.861034] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 2018/03/30 21:36:26 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, 0x0, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:26 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:26 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x0, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:26 executing program 0 (fault-call:16 fault-nth:34): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:26 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000280)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 938.182990] FAULT_INJECTION: forcing a failure. [ 938.182990] name failslab, interval 1, probability 0, space 0, times 0 [ 938.194354] CPU: 0 PID: 14395 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 938.201633] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.210985] Call Trace: [ 938.213579] dump_stack+0x194/0x24d [ 938.217204] ? arch_local_irq_restore+0x53/0x53 [ 938.221857] ? __save_stack_trace+0x7e/0xd0 [ 938.226172] should_fail+0x8c0/0xa40 [ 938.229871] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 938.234960] ? kasan_kmalloc+0xad/0xe0 [ 938.238839] ? kmem_cache_alloc_trace+0x136/0x740 [ 938.243667] ? __memcg_init_list_lru_node+0x169/0x270 [ 938.248839] ? __list_lru_init+0x544/0x750 [ 938.253056] ? sget_userns+0x6b1/0xe40 [ 938.256931] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 938.261674] ? do_mount+0xea4/0x2bb0 [ 938.265368] ? SyS_mount+0xab/0x120 [ 938.268983] ? do_syscall_64+0x281/0x940 [ 938.273037] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 938.278391] ? find_held_lock+0x35/0x1d0 [ 938.282440] ? __lock_is_held+0xb6/0x140 [ 938.286502] ? check_same_owner+0x320/0x320 [ 938.290809] ? rcu_note_context_switch+0x710/0x710 [ 938.295726] should_failslab+0xec/0x120 [ 938.299684] kmem_cache_alloc_trace+0x4b/0x740 [ 938.304254] ? __kmalloc_node+0x33/0x70 [ 938.308216] ? __kmalloc_node+0x33/0x70 [ 938.312173] ? rcu_read_lock_sched_held+0x108/0x120 [ 938.317176] __memcg_init_list_lru_node+0x169/0x270 [ 938.322178] ? list_lru_add+0x7c0/0x7c0 [ 938.326144] ? __kmalloc_node+0x47/0x70 [ 938.330103] __list_lru_init+0x544/0x750 [ 938.334149] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 938.340029] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 938.345035] ? lockdep_init_map+0x9/0x10 [ 938.349075] sget_userns+0x6b1/0xe40 [ 938.352762] ? set_anon_super+0x20/0x20 [ 938.356717] ? put_filp+0x90/0x90 [ 938.360142] ? destroy_unused_super.part.6+0xd0/0xd0 [ 938.365217] ? alloc_vfsmnt+0x762/0x9c0 [ 938.369164] ? path_lookupat+0x238/0xba0 [ 938.373196] ? mnt_free_id.isra.21+0x50/0x50 [ 938.377579] ? trace_hardirqs_off+0x10/0x10 [ 938.381875] ? putname+0xee/0x130 [ 938.385304] ? cap_capable+0x1b5/0x230 [ 938.389177] ? security_capable+0x8e/0xc0 [ 938.393317] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 938.398490] ? ns_capable_common+0xcf/0x160 [ 938.402789] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 938.407960] mount_ns+0x6d/0x190 [ 938.411320] rpc_mount+0x9e/0xd0 [ 938.414669] mount_fs+0x66/0x2d0 [ 938.418018] vfs_kern_mount.part.26+0xc6/0x4a0 [ 938.422579] ? may_umount+0xa0/0xa0 [ 938.426183] ? _raw_read_unlock+0x22/0x30 [ 938.430307] ? __get_fs_type+0x8a/0xc0 [ 938.434169] do_mount+0xea4/0x2bb0 [ 938.437685] ? __might_fault+0x110/0x1d0 [ 938.441736] ? copy_mount_string+0x40/0x40 [ 938.445954] ? check_same_owner+0x320/0x320 [ 938.450256] ? __check_object_size+0x8b/0x530 [ 938.454746] ? __might_sleep+0x95/0x190 [ 938.458720] ? kasan_check_write+0x14/0x20 [ 938.462936] ? _copy_from_user+0x99/0x110 [ 938.467068] ? memdup_user+0x5e/0x90 [ 938.470765] ? copy_mount_options+0x1f7/0x2e0 [ 938.475242] SyS_mount+0xab/0x120 [ 938.478678] ? copy_mnt_ns+0xb30/0xb30 [ 938.482547] do_syscall_64+0x281/0x940 [ 938.486415] ? vmalloc_sync_all+0x30/0x30 [ 938.490539] ? _raw_spin_unlock_irq+0x27/0x70 [ 938.495021] ? finish_task_switch+0x1c1/0x7e0 [ 938.499499] ? syscall_return_slowpath+0x550/0x550 [ 938.504408] ? syscall_return_slowpath+0x2ac/0x550 [ 938.509318] ? prepare_exit_to_usermode+0x350/0x350 [ 938.514311] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 938.519658] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 938.524476] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 938.529638] RIP: 0033:0x454e79 2018/03/30 21:36:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:26 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 938.532802] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 938.540484] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 938.547728] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 938.554973] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 938.562214] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 938.569457] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 2018/03/30 21:36:26 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:26 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x0, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:26 executing program 0 (fault-call:16 fault-nth:35): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:27 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0x0, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x4000000d, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='ext3\x00', 0x10000, &(0x7f00000007c0)="7325fb15bf9d1883d18ee15eb455dfd14926b3e2551e636836fe2b726933cebb16f3b85407f36ebb44d66bb5315963cc9712991112604f89b6c6a3ce216c91e908822a7c4ce3d8ee24f7bfaf59b54477af6a94da03e1cc7ea8c84b19eee3f2204e0524d27c1c4fe57cb27c8112e06ea71f7571d27ed88fd425af4d82aae8d06dc2a7d6506b0b235a80f6f240f68d7ada264de988e7016372fe8dd3a06349cc022e2cbdce91f91f89253f1a4f0136df438e01d7b6a180e2b7077c72efa9389420384a49ab75819ded9ac52422ca5a683b1d397335cd40") 2018/03/30 21:36:27 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x0, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 938.785534] FAULT_INJECTION: forcing a failure. [ 938.785534] name failslab, interval 1, probability 0, space 0, times 0 [ 938.796937] CPU: 1 PID: 14429 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 938.804210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.813555] Call Trace: [ 938.816145] dump_stack+0x194/0x24d [ 938.819770] ? arch_local_irq_restore+0x53/0x53 [ 938.824437] ? __save_stack_trace+0x7e/0xd0 [ 938.828762] should_fail+0x8c0/0xa40 [ 938.832472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 938.837571] ? kasan_kmalloc+0xad/0xe0 [ 938.841458] ? kmem_cache_alloc_trace+0x136/0x740 [ 938.846292] ? __memcg_init_list_lru_node+0x169/0x270 [ 938.851474] ? __list_lru_init+0x544/0x750 [ 938.855701] ? sget_userns+0x6b1/0xe40 [ 938.859580] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 938.864329] ? do_mount+0xea4/0x2bb0 [ 938.868032] ? SyS_mount+0xab/0x120 [ 938.871652] ? do_syscall_64+0x281/0x940 [ 938.875718] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 938.881080] ? find_held_lock+0x35/0x1d0 [ 938.885142] ? __lock_is_held+0xb6/0x140 [ 938.889205] ? check_same_owner+0x320/0x320 [ 938.893527] ? rcu_note_context_switch+0x710/0x710 [ 938.898454] should_failslab+0xec/0x120 [ 938.902425] kmem_cache_alloc_trace+0x4b/0x740 [ 938.907000] ? __kmalloc_node+0x33/0x70 [ 938.910960] ? __kmalloc_node+0x33/0x70 [ 938.914917] ? rcu_read_lock_sched_held+0x108/0x120 [ 938.919910] __memcg_init_list_lru_node+0x169/0x270 [ 938.924910] ? list_lru_add+0x7c0/0x7c0 [ 938.928867] ? __kmalloc_node+0x47/0x70 [ 938.932821] __list_lru_init+0x544/0x750 [ 938.936870] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 938.942742] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 938.947747] ? lockdep_init_map+0x9/0x10 [ 938.951792] sget_userns+0x6b1/0xe40 [ 938.955486] ? set_anon_super+0x20/0x20 [ 938.959436] ? put_filp+0x90/0x90 [ 938.962861] ? destroy_unused_super.part.6+0xd0/0xd0 [ 938.967938] ? alloc_vfsmnt+0x762/0x9c0 [ 938.971886] ? path_lookupat+0x238/0xba0 [ 938.975919] ? mnt_free_id.isra.21+0x50/0x50 [ 938.980303] ? trace_hardirqs_off+0x10/0x10 [ 938.984600] ? putname+0xee/0x130 [ 938.988036] ? cap_capable+0x1b5/0x230 [ 938.991902] ? security_capable+0x8e/0xc0 [ 938.996034] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 939.001200] ? ns_capable_common+0xcf/0x160 [ 939.005500] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 939.010665] mount_ns+0x6d/0x190 [ 939.014008] rpc_mount+0x9e/0xd0 [ 939.017354] mount_fs+0x66/0x2d0 [ 939.020694] vfs_kern_mount.part.26+0xc6/0x4a0 [ 939.025252] ? may_umount+0xa0/0xa0 [ 939.028854] ? _raw_read_unlock+0x22/0x30 [ 939.032977] ? __get_fs_type+0x8a/0xc0 [ 939.036842] do_mount+0xea4/0x2bb0 [ 939.040356] ? __might_fault+0x110/0x1d0 [ 939.044395] ? copy_mount_string+0x40/0x40 [ 939.048604] ? check_same_owner+0x320/0x320 [ 939.052901] ? __check_object_size+0x8b/0x530 [ 939.057371] ? __might_sleep+0x95/0x190 [ 939.061325] ? kasan_check_write+0x14/0x20 [ 939.065534] ? _copy_from_user+0x99/0x110 [ 939.069657] ? memdup_user+0x5e/0x90 [ 939.073347] ? copy_mount_options+0x1f7/0x2e0 [ 939.077816] SyS_mount+0xab/0x120 [ 939.081243] ? copy_mnt_ns+0xb30/0xb30 [ 939.085104] do_syscall_64+0x281/0x940 [ 939.088963] ? vmalloc_sync_all+0x30/0x30 [ 939.093087] ? _raw_spin_unlock_irq+0x27/0x70 [ 939.097555] ? finish_task_switch+0x1c1/0x7e0 [ 939.102029] ? syscall_return_slowpath+0x550/0x550 [ 939.106934] ? syscall_return_slowpath+0x2ac/0x550 [ 939.111841] ? prepare_exit_to_usermode+0x350/0x350 [ 939.116834] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 939.122172] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 939.126995] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 939.132162] RIP: 0033:0x454e79 2018/03/30 21:36:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x0, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:27 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:27 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0x0, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 939.135325] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 939.143007] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 939.150258] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 939.157500] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 939.164756] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 939.171997] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000023 2018/03/30 21:36:27 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:27 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:27 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x40000, &(0x7f0000000400)="7779570733739f549aaac2b21c8115d832b78358bd6df29e68bd34196e9c70795c96154569585c4a75eab8469d8660fbd34efbf2cf812aa6470f53d0ec0a6b3de4385f786acdf1e9d587453a90b6731cdc232b1e2db4a915c696f404") socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:28 executing program 0 (fault-call:16 fault-nth:36): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:28 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0x0, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0x0, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:28 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:28 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:28 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x2007e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) mkdir(&(0x7f0000000280)='./file0\x00', 0x104) 2018/03/30 21:36:28 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 940.314641] FAULT_INJECTION: forcing a failure. [ 940.314641] name failslab, interval 1, probability 0, space 0, times 0 [ 940.326006] CPU: 0 PID: 14498 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 940.333276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.342623] Call Trace: [ 940.345201] dump_stack+0x194/0x24d [ 940.348833] ? arch_local_irq_restore+0x53/0x53 [ 940.353499] ? __save_stack_trace+0x7e/0xd0 [ 940.357819] should_fail+0x8c0/0xa40 2018/03/30 21:36:28 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0x0, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:28 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0x0, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 940.361529] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 940.366632] ? kasan_kmalloc+0xad/0xe0 [ 940.370523] ? kmem_cache_alloc_trace+0x136/0x740 [ 940.375365] ? __memcg_init_list_lru_node+0x169/0x270 [ 940.380550] ? __list_lru_init+0x544/0x750 [ 940.384778] ? sget_userns+0x6b1/0xe40 [ 940.388656] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 940.393402] ? do_mount+0xea4/0x2bb0 [ 940.397107] ? SyS_mount+0xab/0x120 [ 940.400727] ? do_syscall_64+0x281/0x940 [ 940.404782] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 940.410139] ? find_held_lock+0x35/0x1d0 [ 940.414202] ? __lock_is_held+0xb6/0x140 [ 940.418270] ? check_same_owner+0x320/0x320 [ 940.422577] ? rcu_note_context_switch+0x710/0x710 [ 940.427483] should_failslab+0xec/0x120 [ 940.431439] kmem_cache_alloc_trace+0x4b/0x740 [ 940.436013] ? __kmalloc_node+0x33/0x70 [ 940.439966] ? __kmalloc_node+0x33/0x70 [ 940.443913] ? rcu_read_lock_sched_held+0x108/0x120 [ 940.448907] __memcg_init_list_lru_node+0x169/0x270 [ 940.453897] ? list_lru_add+0x7c0/0x7c0 [ 940.457852] ? __kmalloc_node+0x47/0x70 [ 940.461811] __list_lru_init+0x544/0x750 [ 940.465866] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 940.471730] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 940.476736] ? lockdep_init_map+0x9/0x10 [ 940.480780] sget_userns+0x6b1/0xe40 [ 940.484470] ? set_anon_super+0x20/0x20 [ 940.488425] ? put_filp+0x90/0x90 [ 940.491852] ? destroy_unused_super.part.6+0xd0/0xd0 [ 940.496925] ? alloc_vfsmnt+0x762/0x9c0 [ 940.500873] ? path_lookupat+0x238/0xba0 [ 940.504915] ? mnt_free_id.isra.21+0x50/0x50 [ 940.509302] ? trace_hardirqs_off+0x10/0x10 [ 940.513605] ? putname+0xee/0x130 [ 940.517047] ? cap_capable+0x1b5/0x230 [ 940.520912] ? security_capable+0x8e/0xc0 [ 940.525044] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 940.530218] ? ns_capable_common+0xcf/0x160 [ 940.534512] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 940.539679] mount_ns+0x6d/0x190 [ 940.543029] rpc_mount+0x9e/0xd0 [ 940.546382] mount_fs+0x66/0x2d0 [ 940.549730] vfs_kern_mount.part.26+0xc6/0x4a0 [ 940.554283] ? may_umount+0xa0/0xa0 [ 940.557886] ? _raw_read_unlock+0x22/0x30 [ 940.562022] ? __get_fs_type+0x8a/0xc0 [ 940.565985] do_mount+0xea4/0x2bb0 [ 940.570202] ? __might_fault+0x110/0x1d0 [ 940.574256] ? copy_mount_string+0x40/0x40 [ 940.578461] ? check_same_owner+0x320/0x320 [ 940.583103] ? __check_object_size+0x8b/0x530 [ 940.587900] ? __might_sleep+0x95/0x190 [ 940.591858] ? kasan_check_write+0x14/0x20 [ 940.596065] ? _copy_from_user+0x99/0x110 [ 940.600191] ? memdup_user+0x5e/0x90 [ 940.603881] ? copy_mount_options+0x1f7/0x2e0 [ 940.608356] SyS_mount+0xab/0x120 [ 940.611782] ? copy_mnt_ns+0xb30/0xb30 [ 940.615644] do_syscall_64+0x281/0x940 [ 940.619505] ? vmalloc_sync_all+0x30/0x30 [ 940.623630] ? _raw_spin_unlock_irq+0x27/0x70 [ 940.628101] ? finish_task_switch+0x1c1/0x7e0 [ 940.632571] ? syscall_return_slowpath+0x550/0x550 [ 940.637480] ? syscall_return_slowpath+0x2ac/0x550 [ 940.642389] ? prepare_exit_to_usermode+0x350/0x350 [ 940.647385] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 940.652729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 940.657547] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 940.662711] RIP: 0033:0x454e79 [ 940.665886] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 940.673576] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 940.680819] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 940.688062] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 940.695302] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 940.702549] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000024 2018/03/30 21:36:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000000)}, 0x0) recvmsg(r3, &(0x7f0000000880)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000640)=""/128, 0x80}], 0x1, &(0x7f0000000780)=""/225, 0xe1}, 0x0) close(r4) mount(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0xfd, 0x56c96e7c, 0xea, 0xc, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000000280)={r6}) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x0, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 0 (fault-call:16 fault-nth:37): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0x0, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 940.870567] FAULT_INJECTION: forcing a failure. [ 940.870567] name failslab, interval 1, probability 0, space 0, times 0 [ 940.881916] CPU: 0 PID: 14546 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 940.889181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.898522] Call Trace: [ 940.901099] dump_stack+0x194/0x24d [ 940.904719] ? arch_local_irq_restore+0x53/0x53 [ 940.909375] ? __save_stack_trace+0x7e/0xd0 [ 940.913694] should_fail+0x8c0/0xa40 2018/03/30 21:36:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, 0xffffffffffffffff, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 940.917401] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 940.922500] ? kasan_kmalloc+0xad/0xe0 [ 940.926380] ? kmem_cache_alloc_trace+0x136/0x740 [ 940.931216] ? __memcg_init_list_lru_node+0x169/0x270 [ 940.936400] ? __list_lru_init+0x544/0x750 [ 940.940624] ? sget_userns+0x6b1/0xe40 [ 940.944506] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 940.949250] ? do_mount+0xea4/0x2bb0 [ 940.952948] ? SyS_mount+0xab/0x120 [ 940.956558] ? do_syscall_64+0x281/0x940 [ 940.960617] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 940.965981] ? find_held_lock+0x35/0x1d0 [ 940.970034] ? __lock_is_held+0xb6/0x140 [ 940.974075] ? check_same_owner+0x320/0x320 [ 940.978373] ? rcu_note_context_switch+0x710/0x710 [ 940.983282] should_failslab+0xec/0x120 [ 940.987232] kmem_cache_alloc_trace+0x4b/0x740 [ 940.991795] ? __kmalloc_node+0x33/0x70 [ 940.995757] ? __kmalloc_node+0x33/0x70 [ 940.999712] ? rcu_read_lock_sched_held+0x108/0x120 [ 941.004712] __memcg_init_list_lru_node+0x169/0x270 [ 941.009708] ? list_lru_add+0x7c0/0x7c0 [ 941.013664] ? __kmalloc_node+0x47/0x70 [ 941.017621] __list_lru_init+0x544/0x750 [ 941.021658] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 941.027526] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.032523] ? lockdep_init_map+0x9/0x10 [ 941.036569] sget_userns+0x6b1/0xe40 [ 941.040263] ? set_anon_super+0x20/0x20 [ 941.044215] ? put_filp+0x90/0x90 [ 941.047655] ? destroy_unused_super.part.6+0xd0/0xd0 [ 941.052737] ? alloc_vfsmnt+0x762/0x9c0 [ 941.056689] ? path_lookupat+0x238/0xba0 [ 941.060729] ? mnt_free_id.isra.21+0x50/0x50 [ 941.065120] ? trace_hardirqs_off+0x10/0x10 [ 941.069421] ? putname+0xee/0x130 [ 941.072860] ? cap_capable+0x1b5/0x230 [ 941.076724] ? security_capable+0x8e/0xc0 [ 941.080846] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 941.086013] ? ns_capable_common+0xcf/0x160 [ 941.090315] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 941.095482] mount_ns+0x6d/0x190 [ 941.098823] rpc_mount+0x9e/0xd0 [ 941.102160] mount_fs+0x66/0x2d0 [ 941.105503] vfs_kern_mount.part.26+0xc6/0x4a0 [ 941.110055] ? may_umount+0xa0/0xa0 [ 941.113656] ? _raw_read_unlock+0x22/0x30 [ 941.117777] ? __get_fs_type+0x8a/0xc0 [ 941.121639] do_mount+0xea4/0x2bb0 [ 941.125160] ? __might_fault+0x110/0x1d0 [ 941.129211] ? copy_mount_string+0x40/0x40 [ 941.133430] ? check_same_owner+0x320/0x320 [ 941.137729] ? __check_object_size+0x8b/0x530 [ 941.142215] ? __might_sleep+0x95/0x190 [ 941.146177] ? kasan_check_write+0x14/0x20 [ 941.150390] ? _copy_from_user+0x99/0x110 [ 941.154522] ? memdup_user+0x5e/0x90 [ 941.158223] ? copy_mount_options+0x1f7/0x2e0 [ 941.162699] SyS_mount+0xab/0x120 [ 941.166127] ? copy_mnt_ns+0xb30/0xb30 [ 941.170000] do_syscall_64+0x281/0x940 [ 941.173866] ? vmalloc_sync_all+0x30/0x30 [ 941.177991] ? _raw_spin_unlock_irq+0x27/0x70 [ 941.182467] ? finish_task_switch+0x1c1/0x7e0 [ 941.186935] ? syscall_return_slowpath+0x550/0x550 [ 941.191843] ? syscall_return_slowpath+0x2ac/0x550 [ 941.196753] ? prepare_exit_to_usermode+0x350/0x350 [ 941.201750] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 941.207098] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 941.211923] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 941.217089] RIP: 0033:0x454e79 [ 941.220253] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 941.227931] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 941.235181] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 941.242434] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 941.249694] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 941.256950] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000025 2018/03/30 21:36:29 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:29 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 0 (fault-call:16 fault-nth:38): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x0, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x0, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f0000000280)='./file0\x00', 0x101) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:29 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0x0, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:29 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, 0xffffffffffffffff, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 941.692840] FAULT_INJECTION: forcing a failure. [ 941.692840] name failslab, interval 1, probability 0, space 0, times 0 [ 941.704121] CPU: 1 PID: 14583 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 941.711385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.720727] Call Trace: [ 941.723314] dump_stack+0x194/0x24d [ 941.726937] ? arch_local_irq_restore+0x53/0x53 [ 941.731601] ? __save_stack_trace+0x7e/0xd0 [ 941.735930] should_fail+0x8c0/0xa40 2018/03/30 21:36:30 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0x0, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 941.739647] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 941.744748] ? kasan_kmalloc+0xad/0xe0 [ 941.748638] ? kmem_cache_alloc_trace+0x136/0x740 [ 941.753474] ? __memcg_init_list_lru_node+0x169/0x270 [ 941.758657] ? __list_lru_init+0x544/0x750 [ 941.762887] ? sget_userns+0x6b1/0xe40 [ 941.766758] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 941.771488] ? do_mount+0xea4/0x2bb0 [ 941.775180] ? SyS_mount+0xab/0x120 [ 941.778785] ? do_syscall_64+0x281/0x940 [ 941.782829] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 941.788187] ? find_held_lock+0x35/0x1d0 [ 941.792237] ? __lock_is_held+0xb6/0x140 [ 941.796280] ? check_same_owner+0x320/0x320 [ 941.800581] ? rcu_note_context_switch+0x710/0x710 [ 941.805485] should_failslab+0xec/0x120 [ 941.809437] kmem_cache_alloc_trace+0x4b/0x740 [ 941.813994] ? __kmalloc_node+0x33/0x70 [ 941.817953] ? __kmalloc_node+0x33/0x70 [ 941.821909] ? rcu_read_lock_sched_held+0x108/0x120 [ 941.826911] __memcg_init_list_lru_node+0x169/0x270 [ 941.831910] ? list_lru_add+0x7c0/0x7c0 [ 941.835859] ? __kmalloc_node+0x47/0x70 [ 941.839807] __list_lru_init+0x544/0x750 [ 941.843844] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 941.849704] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 941.854696] ? lockdep_init_map+0x9/0x10 [ 941.858739] sget_userns+0x6b1/0xe40 [ 941.862431] ? set_anon_super+0x20/0x20 [ 941.866388] ? put_filp+0x90/0x90 [ 941.869827] ? destroy_unused_super.part.6+0xd0/0xd0 [ 941.874911] ? alloc_vfsmnt+0x762/0x9c0 [ 941.878863] ? path_lookupat+0x238/0xba0 [ 941.882910] ? mnt_free_id.isra.21+0x50/0x50 [ 941.887301] ? trace_hardirqs_off+0x10/0x10 [ 941.891602] ? putname+0xee/0x130 [ 941.895038] ? cap_capable+0x1b5/0x230 [ 941.898905] ? security_capable+0x8e/0xc0 [ 941.903034] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 941.908200] ? ns_capable_common+0xcf/0x160 [ 941.912495] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 941.917659] mount_ns+0x6d/0x190 [ 941.921013] rpc_mount+0x9e/0xd0 [ 941.924359] mount_fs+0x66/0x2d0 [ 941.927698] vfs_kern_mount.part.26+0xc6/0x4a0 [ 941.932254] ? may_umount+0xa0/0xa0 [ 941.935853] ? _raw_read_unlock+0x22/0x30 [ 941.939971] ? __get_fs_type+0x8a/0xc0 [ 941.943837] do_mount+0xea4/0x2bb0 [ 941.947357] ? __might_fault+0x110/0x1d0 [ 941.951393] ? copy_mount_string+0x40/0x40 [ 941.955618] ? check_same_owner+0x320/0x320 [ 941.959930] ? __check_object_size+0x8b/0x530 [ 941.964414] ? __might_sleep+0x95/0x190 [ 941.968371] ? kasan_check_write+0x14/0x20 [ 941.972577] ? _copy_from_user+0x99/0x110 [ 941.976700] ? memdup_user+0x5e/0x90 [ 941.980387] ? copy_mount_options+0x1f7/0x2e0 [ 941.984856] SyS_mount+0xab/0x120 [ 941.988281] ? copy_mnt_ns+0xb30/0xb30 [ 941.992142] do_syscall_64+0x281/0x940 [ 941.995999] ? vmalloc_sync_all+0x30/0x30 [ 942.000125] ? _raw_spin_unlock_irq+0x27/0x70 [ 942.004597] ? finish_task_switch+0x1c1/0x7e0 [ 942.009067] ? syscall_return_slowpath+0x550/0x550 [ 942.013976] ? syscall_return_slowpath+0x2ac/0x550 [ 942.018880] ? prepare_exit_to_usermode+0x350/0x350 [ 942.023877] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 942.029225] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.034045] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 942.039213] RIP: 0033:0x454e79 [ 942.042382] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 942.050063] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 942.057312] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 942.064560] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 942.071799] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 942.079043] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000026 2018/03/30 21:36:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x0, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:30 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:30 executing program 0 (fault-call:16 fault-nth:39): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:30 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x0, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 942.226767] FAULT_INJECTION: forcing a failure. [ 942.226767] name failslab, interval 1, probability 0, space 0, times 0 [ 942.238112] CPU: 1 PID: 14613 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 942.245376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.254724] Call Trace: [ 942.257308] dump_stack+0x194/0x24d [ 942.260934] ? arch_local_irq_restore+0x53/0x53 [ 942.265600] ? __save_stack_trace+0x7e/0xd0 [ 942.269932] should_fail+0x8c0/0xa40 [ 942.273644] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 942.278741] ? kasan_kmalloc+0xad/0xe0 [ 942.282628] ? kmem_cache_alloc_trace+0x136/0x740 [ 942.287453] ? __memcg_init_list_lru_node+0x169/0x270 [ 942.292621] ? __list_lru_init+0x544/0x750 [ 942.296832] ? sget_userns+0x6b1/0xe40 [ 942.300696] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 942.305434] ? do_mount+0xea4/0x2bb0 [ 942.309119] ? SyS_mount+0xab/0x120 [ 942.312720] ? do_syscall_64+0x281/0x940 [ 942.316765] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 942.322108] ? find_held_lock+0x35/0x1d0 [ 942.326154] ? __lock_is_held+0xb6/0x140 [ 942.330203] ? check_same_owner+0x320/0x320 [ 942.334500] ? rcu_note_context_switch+0x710/0x710 [ 942.339417] should_failslab+0xec/0x120 [ 942.343378] kmem_cache_alloc_trace+0x4b/0x740 [ 942.347939] ? __kmalloc_node+0x33/0x70 [ 942.351896] ? __kmalloc_node+0x33/0x70 [ 942.355851] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.360863] __memcg_init_list_lru_node+0x169/0x270 [ 942.365858] ? list_lru_add+0x7c0/0x7c0 [ 942.369815] ? __kmalloc_node+0x47/0x70 [ 942.373781] __list_lru_init+0x544/0x750 [ 942.377831] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 942.383702] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 942.388702] ? lockdep_init_map+0x9/0x10 [ 942.392738] sget_userns+0x6b1/0xe40 [ 942.396423] ? set_anon_super+0x20/0x20 [ 942.400378] ? put_filp+0x90/0x90 [ 942.403815] ? destroy_unused_super.part.6+0xd0/0xd0 [ 942.408888] ? alloc_vfsmnt+0x762/0x9c0 [ 942.412833] ? path_lookupat+0x238/0xba0 [ 942.416873] ? mnt_free_id.isra.21+0x50/0x50 [ 942.421719] ? trace_hardirqs_off+0x10/0x10 [ 942.426028] ? putname+0xee/0x130 [ 942.429463] ? cap_capable+0x1b5/0x230 [ 942.433334] ? security_capable+0x8e/0xc0 [ 942.437472] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 942.442634] ? ns_capable_common+0xcf/0x160 [ 942.446930] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 942.452099] mount_ns+0x6d/0x190 [ 942.455445] rpc_mount+0x9e/0xd0 [ 942.458791] mount_fs+0x66/0x2d0 [ 942.462141] vfs_kern_mount.part.26+0xc6/0x4a0 [ 942.466705] ? may_umount+0xa0/0xa0 [ 942.470311] ? _raw_read_unlock+0x22/0x30 [ 942.474430] ? __get_fs_type+0x8a/0xc0 [ 942.478293] do_mount+0xea4/0x2bb0 [ 942.481822] ? __might_fault+0x110/0x1d0 [ 942.485875] ? copy_mount_string+0x40/0x40 [ 942.490094] ? check_same_owner+0x320/0x320 [ 942.494390] ? __check_object_size+0x8b/0x530 [ 942.498862] ? __might_sleep+0x95/0x190 [ 942.502827] ? kasan_check_write+0x14/0x20 [ 942.507048] ? _copy_from_user+0x99/0x110 [ 942.511179] ? memdup_user+0x5e/0x90 [ 942.514880] ? copy_mount_options+0x1f7/0x2e0 [ 942.519362] SyS_mount+0xab/0x120 [ 942.522796] ? copy_mnt_ns+0xb30/0xb30 [ 942.526657] do_syscall_64+0x281/0x940 [ 942.530531] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 942.536049] ? syscall_return_slowpath+0x550/0x550 [ 942.540954] ? syscall_return_slowpath+0x2ac/0x550 [ 942.545858] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 942.551202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 942.556040] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 942.561210] RIP: 0033:0x454e79 [ 942.564375] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 942.572071] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 942.579312] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 942.586570] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 942.593821] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 942.601072] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000027 2018/03/30 21:36:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x0, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, 0xffffffffffffffff, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x801, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:31 executing program 0 (fault-call:16 fault-nth:40): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x0) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 942.778312] FAULT_INJECTION: forcing a failure. [ 942.778312] name failslab, interval 1, probability 0, space 0, times 0 [ 942.789653] CPU: 1 PID: 14661 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 942.796920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.806263] Call Trace: [ 942.808849] dump_stack+0x194/0x24d [ 942.812472] ? arch_local_irq_restore+0x53/0x53 [ 942.817140] ? __save_stack_trace+0x7e/0xd0 [ 942.821463] should_fail+0x8c0/0xa40 2018/03/30 21:36:31 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x0, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 942.825175] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 942.830267] ? kasan_kmalloc+0xad/0xe0 [ 942.834138] ? kmem_cache_alloc_trace+0x136/0x740 [ 942.838974] ? __memcg_init_list_lru_node+0x169/0x270 [ 942.844156] ? __list_lru_init+0x544/0x750 [ 942.848385] ? sget_userns+0x6b1/0xe40 [ 942.852258] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 942.856987] ? do_mount+0xea4/0x2bb0 [ 942.860683] ? SyS_mount+0xab/0x120 [ 942.864294] ? do_syscall_64+0x281/0x940 [ 942.868330] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 942.873670] ? find_held_lock+0x35/0x1d0 [ 942.877712] ? __lock_is_held+0xb6/0x140 [ 942.881762] ? check_same_owner+0x320/0x320 [ 942.886075] ? rcu_note_context_switch+0x710/0x710 [ 942.890993] should_failslab+0xec/0x120 [ 942.894951] kmem_cache_alloc_trace+0x4b/0x740 [ 942.899509] ? __kmalloc_node+0x33/0x70 [ 942.903459] ? __kmalloc_node+0x33/0x70 [ 942.907424] ? rcu_read_lock_sched_held+0x108/0x120 [ 942.912438] __memcg_init_list_lru_node+0x169/0x270 [ 942.917438] ? list_lru_add+0x7c0/0x7c0 [ 942.921386] ? __kmalloc_node+0x47/0x70 [ 942.925338] __list_lru_init+0x544/0x750 [ 942.929375] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 942.935233] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 942.940222] ? lockdep_init_map+0x9/0x10 [ 942.944266] sget_userns+0x6b1/0xe40 [ 942.947956] ? set_anon_super+0x20/0x20 [ 942.951914] ? put_filp+0x90/0x90 [ 942.955354] ? destroy_unused_super.part.6+0xd0/0xd0 [ 942.960434] ? alloc_vfsmnt+0x762/0x9c0 [ 942.964382] ? path_lookupat+0x238/0xba0 [ 942.968422] ? mnt_free_id.isra.21+0x50/0x50 [ 942.972816] ? trace_hardirqs_off+0x10/0x10 [ 942.977120] ? putname+0xee/0x130 [ 942.980564] ? cap_capable+0x1b5/0x230 [ 942.984425] ? security_capable+0x8e/0xc0 [ 942.988550] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 942.993720] ? ns_capable_common+0xcf/0x160 [ 942.998032] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 943.003202] mount_ns+0x6d/0x190 [ 943.006550] rpc_mount+0x9e/0xd0 [ 943.009897] mount_fs+0x66/0x2d0 [ 943.013235] vfs_kern_mount.part.26+0xc6/0x4a0 [ 943.017791] ? may_umount+0xa0/0xa0 [ 943.021402] ? _raw_read_unlock+0x22/0x30 [ 943.025536] ? __get_fs_type+0x8a/0xc0 [ 943.029404] do_mount+0xea4/0x2bb0 [ 943.032914] ? __might_fault+0x110/0x1d0 [ 943.036957] ? copy_mount_string+0x40/0x40 [ 943.041172] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 943.046172] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.050912] ? retint_kernel+0x10/0x10 [ 943.054782] ? memdup_user+0x5e/0x90 [ 943.058469] ? strndup_user+0x6d/0xb0 [ 943.062242] ? copy_mount_options+0x1f7/0x2e0 [ 943.066708] SyS_mount+0xab/0x120 [ 943.070131] ? copy_mnt_ns+0xb30/0xb30 [ 943.074003] do_syscall_64+0x281/0x940 [ 943.077870] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 943.083378] ? syscall_return_slowpath+0x550/0x550 [ 943.088278] ? syscall_return_slowpath+0x2ac/0x550 [ 943.093182] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 943.098527] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 943.103345] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 943.108507] RIP: 0033:0x454e79 [ 943.111676] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 943.119368] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 943.126619] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 943.133862] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 943.141103] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 943.148348] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000028 2018/03/30 21:36:31 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)={0xffffffffffffffff}) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") r5 = gettid() perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x51, 0x6, 0xfffffffffffffffc, 0x3, 0x0, 0x6, 0x2000, 0x2, 0x2, 0x6a0, 0x81, 0x3, 0x7, 0x9b, 0x4, 0x8, 0xfffffffffffffffc, 0x1, 0x5, 0x1a37, 0x3, 0x3ff, 0x0, 0xe171, 0x4dd, 0x7ff, 0x2, 0x0, 0x1, 0xfffffffffffffffa, 0x1, 0x3, 0x11, 0x10000, 0x8, 0x10001, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000380), 0x1}, 0x1000, 0x8, 0x3, 0x6, 0x6, 0x2, 0x1}, r5, 0x8, r4, 0xa) gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 0 (fault-call:16 fault-nth:41): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x0, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:31 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:31 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x0, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:31 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x0) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 943.707488] FAULT_INJECTION: forcing a failure. [ 943.707488] name failslab, interval 1, probability 0, space 0, times 0 [ 943.718926] CPU: 1 PID: 14698 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 943.726198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.735545] Call Trace: [ 943.738139] dump_stack+0x194/0x24d [ 943.741771] ? arch_local_irq_restore+0x53/0x53 [ 943.746442] ? __save_stack_trace+0x7e/0xd0 [ 943.750772] should_fail+0x8c0/0xa40 2018/03/30 21:36:32 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x0, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 943.754492] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 943.759593] ? kasan_kmalloc+0xad/0xe0 [ 943.763478] ? kmem_cache_alloc_trace+0x136/0x740 [ 943.768315] ? __memcg_init_list_lru_node+0x169/0x270 [ 943.773501] ? __list_lru_init+0x544/0x750 [ 943.777729] ? sget_userns+0x6b1/0xe40 [ 943.781609] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 943.786353] ? do_mount+0xea4/0x2bb0 [ 943.790058] ? SyS_mount+0xab/0x120 [ 943.793674] ? do_syscall_64+0x281/0x940 [ 943.797720] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 943.803065] ? find_held_lock+0x35/0x1d0 [ 943.807102] ? __lock_is_held+0xb6/0x140 [ 943.811153] ? check_same_owner+0x320/0x320 [ 943.815471] ? rcu_note_context_switch+0x710/0x710 [ 943.820394] should_failslab+0xec/0x120 [ 943.824354] kmem_cache_alloc_trace+0x4b/0x740 [ 943.828929] ? __kmalloc_node+0x33/0x70 [ 943.832886] ? __kmalloc_node+0x33/0x70 [ 943.836838] ? rcu_read_lock_sched_held+0x108/0x120 [ 943.841831] __memcg_init_list_lru_node+0x169/0x270 [ 943.846822] ? list_lru_add+0x7c0/0x7c0 [ 943.850779] ? __kmalloc_node+0x47/0x70 [ 943.854739] __list_lru_init+0x544/0x750 [ 943.858785] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 943.864646] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 943.869644] ? lockdep_init_map+0x9/0x10 [ 943.873684] sget_userns+0x6b1/0xe40 [ 943.877370] ? set_anon_super+0x20/0x20 [ 943.881323] ? put_filp+0x90/0x90 [ 943.884750] ? destroy_unused_super.part.6+0xd0/0xd0 [ 943.889825] ? alloc_vfsmnt+0x762/0x9c0 [ 943.893782] ? path_lookupat+0x238/0xba0 [ 943.897824] ? mnt_free_id.isra.21+0x50/0x50 [ 943.902218] ? trace_hardirqs_off+0x10/0x10 [ 943.906512] ? putname+0xee/0x130 [ 943.909940] ? cap_capable+0x1b5/0x230 [ 943.913812] ? security_capable+0x8e/0xc0 [ 943.917947] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 943.923117] ? ns_capable_common+0xcf/0x160 [ 943.927413] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 943.932581] mount_ns+0x6d/0x190 [ 943.935938] rpc_mount+0x9e/0xd0 [ 943.939282] mount_fs+0x66/0x2d0 [ 943.942621] vfs_kern_mount.part.26+0xc6/0x4a0 [ 943.947174] ? may_umount+0xa0/0xa0 [ 943.950774] ? _raw_read_unlock+0x22/0x30 [ 943.954895] ? __get_fs_type+0x8a/0xc0 [ 943.958765] do_mount+0xea4/0x2bb0 [ 943.962290] ? __might_fault+0x110/0x1d0 [ 943.966340] ? copy_mount_string+0x40/0x40 [ 943.970556] ? check_same_owner+0x320/0x320 [ 943.974852] ? __check_object_size+0x8b/0x530 [ 943.979322] ? __might_sleep+0x95/0x190 [ 943.983277] ? kasan_check_write+0x14/0x20 [ 943.987486] ? _copy_from_user+0x99/0x110 [ 943.991620] ? memdup_user+0x5e/0x90 [ 943.995319] ? copy_mount_options+0x1f7/0x2e0 [ 943.999798] SyS_mount+0xab/0x120 [ 944.003234] ? copy_mnt_ns+0xb30/0xb30 [ 944.007099] do_syscall_64+0x281/0x940 [ 944.010959] ? vmalloc_sync_all+0x30/0x30 [ 944.015084] ? _raw_spin_unlock_irq+0x27/0x70 [ 944.019560] ? finish_task_switch+0x1c1/0x7e0 [ 944.024035] ? syscall_return_slowpath+0x550/0x550 [ 944.028953] ? syscall_return_slowpath+0x2ac/0x550 [ 944.033871] ? prepare_exit_to_usermode+0x350/0x350 [ 944.038878] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 944.044227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 944.049055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 944.054219] RIP: 0033:0x454e79 2018/03/30 21:36:32 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x0, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 944.057389] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 944.065079] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 944.072335] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 944.079583] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 944.086832] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 944.094085] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000029 2018/03/30 21:36:32 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:32 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='hostfs\x00', 0x1, &(0x7f00000007c0)="0fe6825faaad84da8287f4dfdf74e05b3eab6c3760a2d69439e2a48b39f6640d329d3cb2246928f64c7973495e76b3067e2a17352607d2d7948ca8da0d4fe1c049306ab2fca6284b372e61e626f29e24a96daa01cf89338e9626455dca62a5bb4f6fd19bdfd84acf4eebaba67f2c4aca755cefa6fbdc903738d166011d70e08b3235a9f9e73d0bcb42790d22d80d1e17624765e553fe27e39a3b002f95ad0196f48ed0ebed580262e9c35d0d31ef3651e413bfa99354dff849b2ec083f74288c56df34bd7ef6568662") socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:32 executing program 0 (fault-call:16 fault-nth:42): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:32 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x0, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:32 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x0) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:32 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 944.275382] FAULT_INJECTION: forcing a failure. [ 944.275382] name failslab, interval 1, probability 0, space 0, times 0 [ 944.286792] CPU: 1 PID: 14742 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 944.294057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.303399] Call Trace: [ 944.305998] dump_stack+0x194/0x24d [ 944.309627] ? arch_local_irq_restore+0x53/0x53 [ 944.314292] ? __save_stack_trace+0x7e/0xd0 [ 944.318612] should_fail+0x8c0/0xa40 2018/03/30 21:36:32 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x0, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 944.322323] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 944.327421] ? kasan_kmalloc+0xad/0xe0 [ 944.331306] ? kmem_cache_alloc_trace+0x136/0x740 [ 944.336136] ? __memcg_init_list_lru_node+0x169/0x270 [ 944.341305] ? __list_lru_init+0x544/0x750 [ 944.345520] ? sget_userns+0x6b1/0xe40 [ 944.349389] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 944.354120] ? do_mount+0xea4/0x2bb0 [ 944.357806] ? SyS_mount+0xab/0x120 [ 944.361409] ? do_syscall_64+0x281/0x940 [ 944.365449] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 944.370788] ? find_held_lock+0x35/0x1d0 [ 944.374823] ? __lock_is_held+0xb6/0x140 [ 944.378863] ? check_same_owner+0x320/0x320 [ 944.383160] ? rcu_note_context_switch+0x710/0x710 [ 944.388065] should_failslab+0xec/0x120 [ 944.392020] kmem_cache_alloc_trace+0x4b/0x740 [ 944.396577] ? __kmalloc_node+0x33/0x70 [ 944.400527] ? __kmalloc_node+0x33/0x70 [ 944.404474] ? rcu_read_lock_sched_held+0x108/0x120 [ 944.409467] __memcg_init_list_lru_node+0x169/0x270 [ 944.414458] ? list_lru_add+0x7c0/0x7c0 [ 944.418917] ? __kmalloc_node+0x47/0x70 [ 944.422869] __list_lru_init+0x544/0x750 [ 944.426907] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 944.432766] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 944.437759] ? lockdep_init_map+0x9/0x10 [ 944.441793] sget_userns+0x6b1/0xe40 [ 944.445481] ? set_anon_super+0x20/0x20 [ 944.449433] ? put_filp+0x90/0x90 [ 944.452861] ? destroy_unused_super.part.6+0xd0/0xd0 [ 944.457938] ? alloc_vfsmnt+0x762/0x9c0 [ 944.461885] ? path_lookupat+0x238/0xba0 [ 944.465920] ? mnt_free_id.isra.21+0x50/0x50 [ 944.470302] ? trace_hardirqs_off+0x10/0x10 [ 944.474599] ? putname+0xee/0x130 [ 944.478030] ? cap_capable+0x1b5/0x230 [ 944.481892] ? security_capable+0x8e/0xc0 [ 944.486023] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 944.491189] ? ns_capable_common+0xcf/0x160 [ 944.495484] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 944.500650] mount_ns+0x6d/0x190 [ 944.503989] rpc_mount+0x9e/0xd0 [ 944.507329] mount_fs+0x66/0x2d0 [ 944.510668] vfs_kern_mount.part.26+0xc6/0x4a0 [ 944.515225] ? may_umount+0xa0/0xa0 [ 944.518825] ? _raw_read_unlock+0x22/0x30 [ 944.522946] ? __get_fs_type+0x8a/0xc0 [ 944.526811] do_mount+0xea4/0x2bb0 [ 944.530327] ? __might_fault+0x110/0x1d0 [ 944.534362] ? copy_mount_string+0x40/0x40 [ 944.538571] ? check_same_owner+0x320/0x320 [ 944.542867] ? __check_object_size+0x8b/0x530 [ 944.547336] ? __might_sleep+0x95/0x190 [ 944.551288] ? kasan_check_write+0x14/0x20 [ 944.555495] ? _copy_from_user+0x99/0x110 [ 944.559619] ? memdup_user+0x5e/0x90 [ 944.563305] ? copy_mount_options+0x1f7/0x2e0 [ 944.567776] SyS_mount+0xab/0x120 [ 944.571203] ? copy_mnt_ns+0xb30/0xb30 [ 944.575066] do_syscall_64+0x281/0x940 [ 944.578929] ? vmalloc_sync_all+0x30/0x30 [ 944.583048] ? _raw_spin_unlock_irq+0x27/0x70 [ 944.587521] ? finish_task_switch+0x1c1/0x7e0 [ 944.591991] ? syscall_return_slowpath+0x550/0x550 [ 944.596894] ? syscall_return_slowpath+0x2ac/0x550 [ 944.601799] ? prepare_exit_to_usermode+0x350/0x350 [ 944.606790] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 944.612130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 944.616951] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 944.622116] RIP: 0033:0x454e79 2018/03/30 21:36:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 944.625280] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 944.632961] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 944.640206] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 944.647447] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 944.654688] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 944.661931] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002a 2018/03/30 21:36:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:33 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:33 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:33 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:33 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x0, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:33 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:33 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:33 executing program 0 (fault-call:16 fault-nth:43): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 945.004207] FAULT_INJECTION: forcing a failure. [ 945.004207] name failslab, interval 1, probability 0, space 0, times 0 [ 945.015586] CPU: 0 PID: 14812 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 945.022852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.032199] Call Trace: [ 945.034785] dump_stack+0x194/0x24d [ 945.038413] ? arch_local_irq_restore+0x53/0x53 [ 945.043079] ? __save_stack_trace+0x7e/0xd0 [ 945.047391] should_fail+0x8c0/0xa40 [ 945.051086] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 945.056166] ? kasan_kmalloc+0xad/0xe0 [ 945.060039] ? kmem_cache_alloc_trace+0x136/0x740 [ 945.064860] ? __memcg_init_list_lru_node+0x169/0x270 [ 945.070030] ? __list_lru_init+0x544/0x750 [ 945.074244] ? sget_userns+0x6b1/0xe40 [ 945.078116] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 945.082841] ? do_mount+0xea4/0x2bb0 [ 945.086525] ? SyS_mount+0xab/0x120 [ 945.090125] ? do_syscall_64+0x281/0x940 [ 945.094158] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 945.099495] ? find_held_lock+0x35/0x1d0 [ 945.103529] ? __lock_is_held+0xb6/0x140 [ 945.107568] ? check_same_owner+0x320/0x320 [ 945.111875] ? rcu_note_context_switch+0x710/0x710 [ 945.116792] should_failslab+0xec/0x120 [ 945.120748] kmem_cache_alloc_trace+0x4b/0x740 [ 945.125303] ? __kmalloc_node+0x33/0x70 [ 945.129252] ? __kmalloc_node+0x33/0x70 [ 945.133199] ? rcu_read_lock_sched_held+0x108/0x120 [ 945.138192] __memcg_init_list_lru_node+0x169/0x270 [ 945.143182] ? list_lru_add+0x7c0/0x7c0 [ 945.147134] ? __kmalloc_node+0x47/0x70 [ 945.151089] __list_lru_init+0x544/0x750 [ 945.155125] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 945.160983] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 945.165972] ? lockdep_init_map+0x9/0x10 [ 945.170012] sget_userns+0x6b1/0xe40 [ 945.173704] ? set_anon_super+0x20/0x20 [ 945.177659] ? put_filp+0x90/0x90 [ 945.181087] ? destroy_unused_super.part.6+0xd0/0xd0 [ 945.186167] ? alloc_vfsmnt+0x762/0x9c0 [ 945.190113] ? path_lookupat+0x238/0xba0 [ 945.194144] ? mnt_free_id.isra.21+0x50/0x50 [ 945.198526] ? trace_hardirqs_off+0x10/0x10 [ 945.202822] ? putname+0xee/0x130 [ 945.206248] ? cap_capable+0x1b5/0x230 [ 945.210110] ? security_capable+0x8e/0xc0 [ 945.214232] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 945.219395] ? ns_capable_common+0xcf/0x160 [ 945.223689] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 945.228880] mount_ns+0x6d/0x190 [ 945.232223] rpc_mount+0x9e/0xd0 [ 945.235561] mount_fs+0x66/0x2d0 [ 945.238901] vfs_kern_mount.part.26+0xc6/0x4a0 [ 945.243453] ? may_umount+0xa0/0xa0 [ 945.247057] ? _raw_read_unlock+0x22/0x30 [ 945.251183] ? __get_fs_type+0x8a/0xc0 [ 945.255050] do_mount+0xea4/0x2bb0 [ 945.258563] ? __might_fault+0x110/0x1d0 [ 945.262596] ? copy_mount_string+0x40/0x40 [ 945.266802] ? check_same_owner+0x320/0x320 [ 945.271098] ? __check_object_size+0x8b/0x530 [ 945.275571] ? __might_sleep+0x95/0x190 [ 945.279519] ? kasan_check_write+0x14/0x20 [ 945.283732] ? _copy_from_user+0x99/0x110 [ 945.287851] ? memdup_user+0x5e/0x90 [ 945.291541] ? copy_mount_options+0x1f7/0x2e0 [ 945.296027] SyS_mount+0xab/0x120 [ 945.299457] ? copy_mnt_ns+0xb30/0xb30 [ 945.303319] do_syscall_64+0x281/0x940 [ 945.307181] ? vmalloc_sync_all+0x30/0x30 [ 945.311312] ? syscall_return_slowpath+0x550/0x550 [ 945.316215] ? syscall_return_slowpath+0x2ac/0x550 [ 945.321116] ? prepare_exit_to_usermode+0x350/0x350 [ 945.326105] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 945.331442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 945.336260] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 945.341427] RIP: 0033:0x454e79 [ 945.344587] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 945.352268] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 945.359509] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 945.366752] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 945.373993] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 945.381247] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002b 2018/03/30 21:36:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000280)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:34 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x0, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x0, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:34 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x0, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:34 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:34 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:34 executing program 0 (fault-call:16 fault-nth:44): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 945.846548] FAULT_INJECTION: forcing a failure. [ 945.846548] name failslab, interval 1, probability 0, space 0, times 0 [ 945.857813] CPU: 1 PID: 14830 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 945.865082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.874424] Call Trace: [ 945.876994] dump_stack+0x194/0x24d [ 945.880605] ? arch_local_irq_restore+0x53/0x53 [ 945.885257] ? __save_stack_trace+0x7e/0xd0 [ 945.889564] should_fail+0x8c0/0xa40 [ 945.893259] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 945.898339] ? kasan_kmalloc+0xad/0xe0 [ 945.902198] ? kmem_cache_alloc_trace+0x136/0x740 [ 945.907018] ? __memcg_init_list_lru_node+0x169/0x270 [ 945.912181] ? __list_lru_init+0x544/0x750 [ 945.916390] ? sget_userns+0x6b1/0xe40 [ 945.920254] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 945.924981] ? do_mount+0xea4/0x2bb0 [ 945.928665] ? SyS_mount+0xab/0x120 [ 945.932264] ? do_syscall_64+0x281/0x940 [ 945.936299] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 945.941642] ? find_held_lock+0x35/0x1d0 [ 945.945678] ? __lock_is_held+0xb6/0x140 [ 945.949721] ? check_same_owner+0x320/0x320 [ 945.954023] ? rcu_note_context_switch+0x710/0x710 [ 945.958928] should_failslab+0xec/0x120 [ 945.962880] kmem_cache_alloc_trace+0x4b/0x740 [ 945.967437] ? __kmalloc_node+0x33/0x70 [ 945.971384] ? __kmalloc_node+0x33/0x70 [ 945.975333] ? rcu_read_lock_sched_held+0x108/0x120 [ 945.980326] __memcg_init_list_lru_node+0x169/0x270 [ 945.985318] ? list_lru_add+0x7c0/0x7c0 [ 945.989263] ? __kmalloc_node+0x47/0x70 [ 945.993216] __list_lru_init+0x544/0x750 [ 945.997253] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 946.003112] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 946.008103] ? lockdep_init_map+0x9/0x10 [ 946.012139] sget_userns+0x6b1/0xe40 [ 946.015822] ? set_anon_super+0x20/0x20 [ 946.019770] ? put_filp+0x90/0x90 [ 946.023196] ? destroy_unused_super.part.6+0xd0/0xd0 [ 946.028273] ? alloc_vfsmnt+0x762/0x9c0 [ 946.032221] ? path_lookupat+0x238/0xba0 [ 946.036257] ? mnt_free_id.isra.21+0x50/0x50 [ 946.040638] ? trace_hardirqs_off+0x10/0x10 [ 946.044931] ? putname+0xee/0x130 [ 946.048362] ? cap_capable+0x1b5/0x230 [ 946.052223] ? security_capable+0x8e/0xc0 [ 946.056348] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 946.061513] ? ns_capable_common+0xcf/0x160 [ 946.065808] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 946.070968] mount_ns+0x6d/0x190 [ 946.074310] rpc_mount+0x9e/0xd0 [ 946.077650] mount_fs+0x66/0x2d0 [ 946.080990] vfs_kern_mount.part.26+0xc6/0x4a0 [ 946.085550] ? may_umount+0xa0/0xa0 [ 946.089150] ? _raw_read_unlock+0x22/0x30 [ 946.093271] ? __get_fs_type+0x8a/0xc0 [ 946.097134] do_mount+0xea4/0x2bb0 [ 946.100646] ? __might_fault+0x110/0x1d0 [ 946.104684] ? copy_mount_string+0x40/0x40 [ 946.108890] ? check_same_owner+0x320/0x320 [ 946.113185] ? __check_object_size+0x8b/0x530 [ 946.117655] ? __might_sleep+0x95/0x190 [ 946.121608] ? kasan_check_write+0x14/0x20 [ 946.125815] ? _copy_from_user+0x99/0x110 [ 946.129937] ? memdup_user+0x5e/0x90 [ 946.133622] ? copy_mount_options+0x1f7/0x2e0 [ 946.138093] SyS_mount+0xab/0x120 [ 946.141519] ? copy_mnt_ns+0xb30/0xb30 [ 946.145379] do_syscall_64+0x281/0x940 [ 946.149238] ? vmalloc_sync_all+0x30/0x30 [ 946.153360] ? _raw_spin_unlock_irq+0x27/0x70 [ 946.157829] ? finish_task_switch+0x1c1/0x7e0 [ 946.162300] ? syscall_return_slowpath+0x550/0x550 [ 946.167202] ? syscall_return_slowpath+0x2ac/0x550 [ 946.172108] ? prepare_exit_to_usermode+0x350/0x350 [ 946.177097] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 946.182434] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 946.187253] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 946.192414] RIP: 0033:0x454e79 [ 946.195579] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 946.203261] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 946.210506] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 946.217752] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 946.224996] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 946.232243] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002c 2018/03/30 21:36:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x0, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:35 executing program 0 (fault-call:16 fault-nth:45): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:35 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0xc85, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:35 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x0, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:35 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:35 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) socketpair(0x3, 0x0, 0x2, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000380)) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 946.833375] FAULT_INJECTION: forcing a failure. [ 946.833375] name failslab, interval 1, probability 0, space 0, times 0 [ 946.844645] CPU: 0 PID: 14864 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 946.851907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.861249] Call Trace: [ 946.863837] dump_stack+0x194/0x24d [ 946.867459] ? arch_local_irq_restore+0x53/0x53 [ 946.872123] ? __save_stack_trace+0x7e/0xd0 [ 946.876448] should_fail+0x8c0/0xa40 2018/03/30 21:36:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:35 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 946.880158] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 946.885258] ? kasan_kmalloc+0xad/0xe0 [ 946.889144] ? kmem_cache_alloc_trace+0x136/0x740 [ 946.893982] ? __memcg_init_list_lru_node+0x169/0x270 [ 946.899163] ? __list_lru_init+0x544/0x750 [ 946.903392] ? sget_userns+0x6b1/0xe40 [ 946.907278] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 946.912027] ? do_mount+0xea4/0x2bb0 [ 946.915743] ? SyS_mount+0xab/0x120 [ 946.919364] ? do_syscall_64+0x281/0x940 [ 946.923419] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 946.928785] ? find_held_lock+0x35/0x1d0 [ 946.932855] ? __lock_is_held+0xb6/0x140 [ 946.936908] ? check_same_owner+0x320/0x320 [ 946.941216] ? rcu_note_context_switch+0x710/0x710 [ 946.946129] should_failslab+0xec/0x120 [ 946.950083] kmem_cache_alloc_trace+0x4b/0x740 [ 946.954640] ? __kmalloc_node+0x33/0x70 [ 946.958588] ? __kmalloc_node+0x33/0x70 [ 946.962537] ? rcu_read_lock_sched_held+0x108/0x120 [ 946.967529] __memcg_init_list_lru_node+0x169/0x270 [ 946.972521] ? list_lru_add+0x7c0/0x7c0 [ 946.976467] ? __kmalloc_node+0x47/0x70 [ 946.980419] __list_lru_init+0x544/0x750 [ 946.984457] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 946.990314] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 946.995307] ? lockdep_init_map+0x9/0x10 [ 946.999346] sget_userns+0x6b1/0xe40 [ 947.003035] ? set_anon_super+0x20/0x20 [ 947.006985] ? put_filp+0x90/0x90 [ 947.010415] ? destroy_unused_super.part.6+0xd0/0xd0 [ 947.015493] ? alloc_vfsmnt+0x762/0x9c0 [ 947.019442] ? path_lookupat+0x238/0xba0 [ 947.023477] ? mnt_free_id.isra.21+0x50/0x50 [ 947.027857] ? trace_hardirqs_off+0x10/0x10 [ 947.032151] ? putname+0xee/0x130 [ 947.035584] ? cap_capable+0x1b5/0x230 [ 947.039447] ? security_capable+0x8e/0xc0 [ 947.043569] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 947.048733] ? ns_capable_common+0xcf/0x160 [ 947.053033] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 947.058198] mount_ns+0x6d/0x190 [ 947.061538] rpc_mount+0x9e/0xd0 [ 947.064877] mount_fs+0x66/0x2d0 [ 947.068217] vfs_kern_mount.part.26+0xc6/0x4a0 [ 947.072772] ? may_umount+0xa0/0xa0 [ 947.076376] ? _raw_read_unlock+0x22/0x30 [ 947.080497] ? __get_fs_type+0x8a/0xc0 [ 947.084361] do_mount+0xea4/0x2bb0 [ 947.087875] ? __might_fault+0x110/0x1d0 [ 947.091910] ? copy_mount_string+0x40/0x40 [ 947.096119] ? check_same_owner+0x320/0x320 [ 947.100416] ? __check_object_size+0x8b/0x530 [ 947.104889] ? __might_sleep+0x95/0x190 [ 947.108842] ? kasan_check_write+0x14/0x20 [ 947.113049] ? _copy_from_user+0x99/0x110 [ 947.117170] ? memdup_user+0x5e/0x90 [ 947.120855] ? copy_mount_options+0x1f7/0x2e0 [ 947.125324] SyS_mount+0xab/0x120 [ 947.128751] ? copy_mnt_ns+0xb30/0xb30 [ 947.132616] do_syscall_64+0x281/0x940 [ 947.136475] ? vmalloc_sync_all+0x30/0x30 [ 947.140595] ? _raw_spin_unlock_irq+0x27/0x70 [ 947.145064] ? finish_task_switch+0x1c1/0x7e0 [ 947.149532] ? syscall_return_slowpath+0x550/0x550 [ 947.154432] ? syscall_return_slowpath+0x2ac/0x550 [ 947.159333] ? prepare_exit_to_usermode+0x350/0x350 [ 947.164323] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 947.169660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 947.174479] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 947.179640] RIP: 0033:0x454e79 [ 947.182803] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 947.190484] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 947.197728] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 947.204968] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 947.212213] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 947.219457] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002d 2018/03/30 21:36:35 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x0, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:35 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x0, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:35 executing program 0 (fault-call:16 fault-nth:46): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 947.421579] FAULT_INJECTION: forcing a failure. [ 947.421579] name failslab, interval 1, probability 0, space 0, times 0 [ 947.432936] CPU: 1 PID: 14913 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 947.440205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.449548] Call Trace: [ 947.452132] dump_stack+0x194/0x24d [ 947.455756] ? arch_local_irq_restore+0x53/0x53 [ 947.460422] ? __save_stack_trace+0x7e/0xd0 [ 947.464746] should_fail+0x8c0/0xa40 [ 947.468448] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 947.473529] ? kasan_kmalloc+0xad/0xe0 [ 947.477388] ? kmem_cache_alloc_trace+0x136/0x740 [ 947.482213] ? __memcg_init_list_lru_node+0x169/0x270 [ 947.487381] ? __list_lru_init+0x544/0x750 [ 947.491585] ? sget_userns+0x6b1/0xe40 [ 947.495457] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 947.500194] ? do_mount+0xea4/0x2bb0 [ 947.503878] ? SyS_mount+0xab/0x120 [ 947.507482] ? do_syscall_64+0x281/0x940 [ 947.511523] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 947.516862] ? find_held_lock+0x35/0x1d0 [ 947.520898] ? __lock_is_held+0xb6/0x140 [ 947.524937] ? check_same_owner+0x320/0x320 [ 947.529244] ? rcu_note_context_switch+0x710/0x710 [ 947.534148] should_failslab+0xec/0x120 [ 947.538099] kmem_cache_alloc_trace+0x4b/0x740 [ 947.542655] ? __kmalloc_node+0x33/0x70 [ 947.546604] __memcg_init_list_lru_node+0x169/0x270 [ 947.551595] ? list_lru_add+0x7c0/0x7c0 [ 947.555541] ? __kmalloc_node+0x47/0x70 [ 947.559489] __list_lru_init+0x544/0x750 [ 947.563525] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 947.569383] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 947.574375] ? lockdep_init_map+0x9/0x10 [ 947.578411] sget_userns+0x6b1/0xe40 [ 947.582099] ? set_anon_super+0x20/0x20 [ 947.586046] ? put_filp+0x90/0x90 [ 947.589473] ? destroy_unused_super.part.6+0xd0/0xd0 [ 947.594545] ? alloc_vfsmnt+0x762/0x9c0 [ 947.598489] ? path_lookupat+0x238/0xba0 [ 947.602522] ? mnt_free_id.isra.21+0x50/0x50 [ 947.606904] ? trace_hardirqs_off+0x10/0x10 [ 947.611198] ? putname+0xee/0x130 [ 947.614625] ? cap_capable+0x1b5/0x230 [ 947.618485] ? security_capable+0x8e/0xc0 [ 947.622619] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 947.627790] ? ns_capable_common+0xcf/0x160 [ 947.632084] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 947.637244] mount_ns+0x6d/0x190 [ 947.640584] rpc_mount+0x9e/0xd0 [ 947.643924] mount_fs+0x66/0x2d0 [ 947.647263] vfs_kern_mount.part.26+0xc6/0x4a0 [ 947.651814] ? may_umount+0xa0/0xa0 [ 947.656464] ? _raw_read_unlock+0x22/0x30 [ 947.660584] ? __get_fs_type+0x8a/0xc0 [ 947.664442] do_mount+0xea4/0x2bb0 [ 947.667956] ? __might_fault+0x110/0x1d0 [ 947.671992] ? copy_mount_string+0x40/0x40 [ 947.676213] ? check_same_owner+0x320/0x320 [ 947.680518] ? __check_object_size+0x8b/0x530 [ 947.685003] ? __might_sleep+0x95/0x190 [ 947.688959] ? kasan_check_write+0x14/0x20 [ 947.693170] ? _copy_from_user+0x99/0x110 [ 947.697294] ? memdup_user+0x5e/0x90 [ 947.700982] ? copy_mount_options+0x1f7/0x2e0 [ 947.705466] SyS_mount+0xab/0x120 [ 947.708897] ? copy_mnt_ns+0xb30/0xb30 [ 947.712763] do_syscall_64+0x281/0x940 [ 947.716622] ? vmalloc_sync_all+0x30/0x30 [ 947.720756] ? _raw_spin_unlock_irq+0x27/0x70 [ 947.725224] ? finish_task_switch+0x1c1/0x7e0 [ 947.729699] ? syscall_return_slowpath+0x550/0x550 [ 947.734605] ? syscall_return_slowpath+0x2ac/0x550 [ 947.739506] ? prepare_exit_to_usermode+0x350/0x350 [ 947.744498] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 947.749838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 947.754655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 947.759818] RIP: 0033:0x454e79 [ 947.762983] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 947.770665] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 947.777912] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 947.785157] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 947.792401] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 947.799647] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002e 2018/03/30 21:36:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x0, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x0, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:36 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x0, 0xfffffffffffff800, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:36 executing program 0 (fault-call:16 fault-nth:47): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) r3 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r5 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) recvmsg(r4, &(0x7f00000005c0)={&(0x7f0000000400)=@sco, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000380)=""/61, 0x3d}, {&(0x7f00000007c0)=""/249, 0xf9}, {&(0x7f0000000580)=""/48, 0x30}, {&(0x7f0000000bc0)=""/4096, 0x1000}, {&(0x7f0000000700)=""/110, 0x6e}, {&(0x7f00000008c0)=""/74, 0x4a}], 0x6, &(0x7f0000001bc0)=""/4096, 0x1000, 0x1}, 0x0) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000280)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") recvmsg$kcm(r3, &(0x7f0000002e00)={&(0x7f0000002c00)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002d00)=""/164, 0xa4}], 0x1, &(0x7f0000002dc0)=""/62, 0x3e, 0x80000001}, 0x40000001) bpf$PROG_LOAD(0x5, &(0x7f0000002e40)={0xf, 0x8, &(0x7f0000000940)=@raw=[@jmp={0x5, 0x2, 0xf, 0x7, 0xa, 0xfffffffc, 0xfffffffffffffffc}, @map={0x18, 0x9, 0x1, 0x0, r1}, @map={0x18, 0x5, 0x1, 0x0, r4}, @map={0x18, 0xa, 0x1, 0x0, r2}], &(0x7f0000000a40)='GPL\x00', 0x2, 0x31, &(0x7f0000002bc0)=""/49, 0x41100, 0x1, [], r6}, 0x48) gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 947.916653] FAULT_INJECTION: forcing a failure. [ 947.916653] name failslab, interval 1, probability 0, space 0, times 0 [ 947.928075] CPU: 1 PID: 14944 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 947.935351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.944701] Call Trace: [ 947.947288] dump_stack+0x194/0x24d [ 947.950921] ? arch_local_irq_restore+0x53/0x53 [ 947.955586] ? __save_stack_trace+0x7e/0xd0 [ 947.959909] should_fail+0x8c0/0xa40 2018/03/30 21:36:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x0, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 947.963619] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 947.968724] ? kasan_kmalloc+0xad/0xe0 [ 947.972608] ? kmem_cache_alloc_trace+0x136/0x740 [ 947.977443] ? __memcg_init_list_lru_node+0x169/0x270 [ 947.982635] ? __list_lru_init+0x544/0x750 [ 947.986863] ? sget_userns+0x6b1/0xe40 [ 947.990748] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 947.995496] ? do_mount+0xea4/0x2bb0 [ 947.999191] ? SyS_mount+0xab/0x120 [ 948.002793] ? do_syscall_64+0x281/0x940 [ 948.006839] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 948.012189] ? find_held_lock+0x35/0x1d0 [ 948.016225] ? __lock_is_held+0xb6/0x140 [ 948.020265] ? check_same_owner+0x320/0x320 [ 948.024566] ? rcu_note_context_switch+0x710/0x710 [ 948.029476] should_failslab+0xec/0x120 [ 948.033436] kmem_cache_alloc_trace+0x4b/0x740 [ 948.037995] ? __kmalloc_node+0x33/0x70 [ 948.041958] ? __kmalloc_node+0x33/0x70 [ 948.045925] ? rcu_read_lock_sched_held+0x108/0x120 [ 948.050922] __memcg_init_list_lru_node+0x169/0x270 [ 948.055926] ? list_lru_add+0x7c0/0x7c0 [ 948.059877] ? __kmalloc_node+0x47/0x70 [ 948.063841] __list_lru_init+0x544/0x750 [ 948.067901] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 948.073774] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.078768] ? lockdep_init_map+0x9/0x10 [ 948.082806] sget_userns+0x6b1/0xe40 [ 948.086499] ? set_anon_super+0x20/0x20 [ 948.090457] ? put_filp+0x90/0x90 [ 948.093882] ? destroy_unused_super.part.6+0xd0/0xd0 [ 948.098960] ? alloc_vfsmnt+0x762/0x9c0 [ 948.102914] ? path_lookupat+0x238/0xba0 [ 948.106951] ? mnt_free_id.isra.21+0x50/0x50 [ 948.111333] ? trace_hardirqs_off+0x10/0x10 [ 948.115631] ? putname+0xee/0x130 [ 948.119059] ? cap_capable+0x1b5/0x230 [ 948.122926] ? security_capable+0x8e/0xc0 [ 948.127068] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 948.132241] ? ns_capable_common+0xcf/0x160 [ 948.136540] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 948.141712] mount_ns+0x6d/0x190 [ 948.145065] rpc_mount+0x9e/0xd0 [ 948.148404] mount_fs+0x66/0x2d0 [ 948.151745] vfs_kern_mount.part.26+0xc6/0x4a0 [ 948.156297] ? may_umount+0xa0/0xa0 [ 948.159896] ? _raw_read_unlock+0x22/0x30 [ 948.164021] ? __get_fs_type+0x8a/0xc0 [ 948.167893] do_mount+0xea4/0x2bb0 [ 948.171421] ? __might_fault+0x110/0x1d0 [ 948.175472] ? copy_mount_string+0x40/0x40 [ 948.179689] ? check_same_owner+0x320/0x320 [ 948.183992] ? __check_object_size+0x8b/0x530 [ 948.188474] ? __might_sleep+0x95/0x190 [ 948.192433] ? kasan_check_write+0x14/0x20 [ 948.196649] ? _copy_from_user+0x99/0x110 [ 948.200778] ? memdup_user+0x5e/0x90 [ 948.204463] ? copy_mount_options+0x1f7/0x2e0 [ 948.208931] SyS_mount+0xab/0x120 [ 948.212358] ? copy_mnt_ns+0xb30/0xb30 [ 948.216219] do_syscall_64+0x281/0x940 [ 948.220083] ? vmalloc_sync_all+0x30/0x30 [ 948.224211] ? _raw_spin_unlock_irq+0x27/0x70 [ 948.228686] ? finish_task_switch+0x1c1/0x7e0 [ 948.233154] ? syscall_return_slowpath+0x550/0x550 [ 948.238057] ? syscall_return_slowpath+0x2ac/0x550 [ 948.242963] ? prepare_exit_to_usermode+0x350/0x350 [ 948.247955] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 948.253294] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 948.258149] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 948.263315] RIP: 0033:0x454e79 2018/03/30 21:36:36 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0x0, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x0, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 948.266493] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 948.274182] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 948.281433] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 948.288673] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 948.295920] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 948.303171] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000002f 2018/03/30 21:36:36 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x0, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 0 (fault-call:16 fault-nth:48): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0x0, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 948.484348] FAULT_INJECTION: forcing a failure. [ 948.484348] name failslab, interval 1, probability 0, space 0, times 0 [ 948.495771] CPU: 0 PID: 14979 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 948.503041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.512388] Call Trace: [ 948.514973] dump_stack+0x194/0x24d [ 948.518605] ? arch_local_irq_restore+0x53/0x53 [ 948.523271] ? __save_stack_trace+0x7e/0xd0 [ 948.527595] should_fail+0x8c0/0xa40 2018/03/30 21:36:36 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x0, 0x3ff, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:36 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 948.531305] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 948.536399] ? kasan_kmalloc+0xad/0xe0 [ 948.540278] ? kmem_cache_alloc_trace+0x136/0x740 [ 948.545114] ? __memcg_init_list_lru_node+0x169/0x270 [ 948.550300] ? __list_lru_init+0x544/0x750 [ 948.554530] ? sget_userns+0x6b1/0xe40 [ 948.558414] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 948.563164] ? do_mount+0xea4/0x2bb0 [ 948.566872] ? SyS_mount+0xab/0x120 [ 948.570498] ? do_syscall_64+0x281/0x940 [ 948.574555] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 948.579922] ? find_held_lock+0x35/0x1d0 2018/03/30 21:36:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 948.583983] ? __lock_is_held+0xb6/0x140 [ 948.588519] ? check_same_owner+0x320/0x320 [ 948.592840] ? rcu_note_context_switch+0x710/0x710 [ 948.597766] should_failslab+0xec/0x120 [ 948.601737] kmem_cache_alloc_trace+0x4b/0x740 [ 948.606317] ? __kmalloc_node+0x33/0x70 [ 948.610294] __memcg_init_list_lru_node+0x169/0x270 [ 948.615310] ? list_lru_add+0x7c0/0x7c0 [ 948.619278] ? __kmalloc_node+0x47/0x70 [ 948.623251] __list_lru_init+0x544/0x750 [ 948.627311] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 2018/03/30 21:36:36 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0x0, 0x7, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 948.633196] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 948.638213] ? lockdep_init_map+0x9/0x10 [ 948.642277] sget_userns+0x6b1/0xe40 [ 948.645980] ? set_anon_super+0x20/0x20 [ 948.649951] ? put_filp+0x90/0x90 [ 948.653403] ? destroy_unused_super.part.6+0xd0/0xd0 [ 948.658490] ? alloc_vfsmnt+0x762/0x9c0 [ 948.662441] ? path_lookupat+0x238/0xba0 [ 948.666477] ? mnt_free_id.isra.21+0x50/0x50 [ 948.670865] ? trace_hardirqs_off+0x10/0x10 [ 948.675180] ? putname+0xee/0x130 [ 948.678629] ? cap_capable+0x1b5/0x230 [ 948.682502] ? security_capable+0x8e/0xc0 [ 948.686637] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 948.691812] ? ns_capable_common+0xcf/0x160 [ 948.696111] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 948.701281] mount_ns+0x6d/0x190 [ 948.704623] rpc_mount+0x9e/0xd0 [ 948.707962] mount_fs+0x66/0x2d0 [ 948.711304] vfs_kern_mount.part.26+0xc6/0x4a0 [ 948.715869] ? may_umount+0xa0/0xa0 [ 948.719479] ? _raw_read_unlock+0x22/0x30 [ 948.723613] ? __get_fs_type+0x8a/0xc0 [ 948.727482] do_mount+0xea4/0x2bb0 [ 948.730994] ? __might_fault+0x110/0x1d0 [ 948.735049] ? copy_mount_string+0x40/0x40 [ 948.739271] ? check_same_owner+0x320/0x320 [ 948.743574] ? __check_object_size+0x8b/0x530 [ 948.748058] ? __might_sleep+0x95/0x190 [ 948.752025] ? kasan_check_write+0x14/0x20 [ 948.756238] ? _copy_from_user+0x99/0x110 [ 948.760362] ? memdup_user+0x5e/0x90 [ 948.764058] ? copy_mount_options+0x1f7/0x2e0 [ 948.768542] SyS_mount+0xab/0x120 [ 948.771980] ? copy_mnt_ns+0xb30/0xb30 [ 948.775848] do_syscall_64+0x281/0x940 [ 948.779712] ? vmalloc_sync_all+0x30/0x30 [ 948.783849] ? _raw_spin_unlock_irq+0x27/0x70 [ 948.788329] ? finish_task_switch+0x1c1/0x7e0 [ 948.792811] ? syscall_return_slowpath+0x550/0x550 [ 948.797735] ? syscall_return_slowpath+0x2ac/0x550 [ 948.802649] ? prepare_exit_to_usermode+0x350/0x350 [ 948.807643] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 948.812982] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 948.817800] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 948.822964] RIP: 0033:0x454e79 [ 948.826126] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 21:36:37 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) [ 948.833810] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 948.841051] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 948.848295] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 948.855538] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 948.862781] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000030 2018/03/30 21:36:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x0, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 0 (fault-call:16 fault-nth:49): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x0, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:38 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='btrfs\x00', 0x10800, &(0x7f0000000bc0)="21a992abaa7df5b3c88ff7cac32a834786c2f33fc4d84cd040b9eb33ea424354c1241b430ff4b93309b59d016276e401534ad9a71fc60c8b7c183b865d68182fa67e7eb432db3b5adc84d01e68a8b375c97b18fc61af2e0e7e6fdbfad6c60d34a9819702630a319584e0869ef62c82cad91eb19f3754e708b57b0b00389773b278fc52d4d23f87d09d595042a6d2636d60f3eb04d7c772e4beb7c9883223f6099427a4ac0d9b237a2794f742a9220519dab5202712972d1c83f693b50786b7ba9ca3c9f584276f61b22d9c1dca0a244e214dce1b53911dc1b19aeb") mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f00000007c0)="111234243c5fddb55ebbf592506f7a9dd1cdc9e36a5fbc09bc316e09289355de792c78e1ddc16bbe0b9f865b6193d1e41529338be9729be33ee2b9d7881c18d8d084ab49308703d9010130797d1afcff7f3e8af5189f0daa287fa1d53df8d71aa8300ea5cd6fc58193554704ec56a8085b5c11d0093d5e3ffee794f2098f0127b80f99266e56a2ab97dcc7f62ab88dac0eb6d3faa7a790b26f1757380d781941d13026427ead33c1fc6a6ff8764ad4501b1c83764232c063daa736c97d698fc178d76a2fd2f2a49b041cd58ed20555605b9c279cc3779e474ee4d0a01bb9"}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 949.856206] FAULT_INJECTION: forcing a failure. [ 949.856206] name failslab, interval 1, probability 0, space 0, times 0 [ 949.867515] CPU: 1 PID: 15040 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 949.874776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.884114] Call Trace: [ 949.886684] dump_stack+0x194/0x24d [ 949.890291] ? arch_local_irq_restore+0x53/0x53 [ 949.894939] ? __save_stack_trace+0x7e/0xd0 [ 949.899246] should_fail+0x8c0/0xa40 [ 949.902938] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 949.908027] ? kasan_kmalloc+0xad/0xe0 [ 949.911888] ? kmem_cache_alloc_trace+0x136/0x740 [ 949.916709] ? __memcg_init_list_lru_node+0x169/0x270 [ 949.921869] ? __list_lru_init+0x544/0x750 [ 949.926077] ? sget_userns+0x6b1/0xe40 [ 949.929940] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 949.934665] ? do_mount+0xea4/0x2bb0 [ 949.938353] ? SyS_mount+0xab/0x120 [ 949.941955] ? do_syscall_64+0x281/0x940 [ 949.945990] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 949.951335] ? find_held_lock+0x35/0x1d0 [ 949.955372] ? __lock_is_held+0xb6/0x140 [ 949.959411] ? check_same_owner+0x320/0x320 [ 949.963710] ? rcu_note_context_switch+0x710/0x710 [ 949.968616] should_failslab+0xec/0x120 [ 949.972566] kmem_cache_alloc_trace+0x4b/0x740 [ 949.977119] ? __kmalloc_node+0x33/0x70 [ 949.981068] ? __kmalloc_node+0x33/0x70 [ 949.985024] ? rcu_read_lock_sched_held+0x108/0x120 [ 949.990027] __memcg_init_list_lru_node+0x169/0x270 [ 949.995022] ? list_lru_add+0x7c0/0x7c0 [ 949.998970] ? __kmalloc_node+0x47/0x70 [ 950.002923] __list_lru_init+0x544/0x750 [ 950.006963] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 950.012821] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 950.017812] ? lockdep_init_map+0x9/0x10 [ 950.021850] sget_userns+0x6b1/0xe40 [ 950.025537] ? set_anon_super+0x20/0x20 [ 950.029491] ? put_filp+0x90/0x90 [ 950.032918] ? destroy_unused_super.part.6+0xd0/0xd0 [ 950.037999] ? alloc_vfsmnt+0x762/0x9c0 [ 950.041953] ? path_lookupat+0x238/0xba0 [ 950.045988] ? mnt_free_id.isra.21+0x50/0x50 [ 950.050377] ? trace_hardirqs_off+0x10/0x10 [ 950.054671] ? putname+0xee/0x130 [ 950.058102] ? cap_capable+0x1b5/0x230 [ 950.061963] ? security_capable+0x8e/0xc0 [ 950.066090] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 950.071251] ? ns_capable_common+0xcf/0x160 [ 950.075550] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 950.080713] mount_ns+0x6d/0x190 [ 950.084055] rpc_mount+0x9e/0xd0 [ 950.087395] mount_fs+0x66/0x2d0 [ 950.090737] vfs_kern_mount.part.26+0xc6/0x4a0 [ 950.095294] ? may_umount+0xa0/0xa0 [ 950.098898] ? _raw_read_unlock+0x22/0x30 [ 950.103025] ? __get_fs_type+0x8a/0xc0 [ 950.106887] do_mount+0xea4/0x2bb0 [ 950.110398] ? __might_fault+0x110/0x1d0 [ 950.114435] ? copy_mount_string+0x40/0x40 [ 950.118645] ? check_same_owner+0x320/0x320 [ 950.122942] ? __check_object_size+0x8b/0x530 [ 950.127422] ? __might_sleep+0x95/0x190 [ 950.131372] ? kasan_check_write+0x14/0x20 [ 950.135582] ? _copy_from_user+0x99/0x110 [ 950.139706] ? memdup_user+0x5e/0x90 [ 950.143391] ? copy_mount_options+0x1f7/0x2e0 [ 950.147862] SyS_mount+0xab/0x120 [ 950.151289] ? copy_mnt_ns+0xb30/0xb30 [ 950.155151] do_syscall_64+0x281/0x940 [ 950.159014] ? vmalloc_sync_all+0x30/0x30 [ 950.163139] ? _raw_spin_unlock_irq+0x27/0x70 [ 950.167617] ? finish_task_switch+0x1c1/0x7e0 [ 950.172087] ? syscall_return_slowpath+0x550/0x550 [ 950.176990] ? syscall_return_slowpath+0x2ac/0x550 [ 950.181896] ? prepare_exit_to_usermode+0x350/0x350 [ 950.186883] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 950.192221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 950.197039] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 950.202199] RIP: 0033:0x454e79 [ 950.205362] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 950.213043] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 950.220286] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 950.227527] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 950.234770] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 950.242018] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000031 2018/03/30 21:36:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, r0, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x0, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x0, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:38 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r6 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000580)={r5, r4}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000280)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) mount(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='msdos\x00', 0x2041000, 0x0) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(r7) 2018/03/30 21:36:38 executing program 0 (fault-call:16 fault-nth:50): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:38 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x0, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:38 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x0, 0x6, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 950.456732] FAULT_INJECTION: forcing a failure. [ 950.456732] name failslab, interval 1, probability 0, space 0, times 0 [ 950.468206] CPU: 0 PID: 15081 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 950.475476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.484822] Call Trace: [ 950.487407] dump_stack+0x194/0x24d [ 950.491030] ? arch_local_irq_restore+0x53/0x53 [ 950.495692] ? __save_stack_trace+0x7e/0xd0 [ 950.500002] should_fail+0x8c0/0xa40 [ 950.503698] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 950.508779] ? kasan_kmalloc+0xad/0xe0 [ 950.512642] ? kmem_cache_alloc_trace+0x136/0x740 [ 950.517469] ? __memcg_init_list_lru_node+0x169/0x270 [ 950.522650] ? __list_lru_init+0x544/0x750 [ 950.526862] ? sget_userns+0x6b1/0xe40 [ 950.530726] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 950.535460] ? do_mount+0xea4/0x2bb0 [ 950.539145] ? SyS_mount+0xab/0x120 [ 950.542752] ? do_syscall_64+0x281/0x940 [ 950.546802] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 950.552152] ? find_held_lock+0x35/0x1d0 [ 950.556190] ? __lock_is_held+0xb6/0x140 [ 950.560231] ? check_same_owner+0x320/0x320 [ 950.564528] ? rcu_note_context_switch+0x710/0x710 [ 950.569433] should_failslab+0xec/0x120 [ 950.573385] kmem_cache_alloc_trace+0x4b/0x740 [ 950.577945] ? __kmalloc_node+0x33/0x70 [ 950.581905] ? __kmalloc_node+0x33/0x70 [ 950.586275] ? rcu_read_lock_sched_held+0x108/0x120 [ 950.591278] __memcg_init_list_lru_node+0x169/0x270 [ 950.596539] ? list_lru_add+0x7c0/0x7c0 [ 950.600488] ? __kmalloc_node+0x47/0x70 [ 950.604438] __list_lru_init+0x544/0x750 [ 950.608483] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 950.614350] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 950.619350] ? lockdep_init_map+0x9/0x10 [ 950.623390] sget_userns+0x6b1/0xe40 [ 950.627081] ? set_anon_super+0x20/0x20 [ 950.631039] ? put_filp+0x90/0x90 [ 950.634468] ? destroy_unused_super.part.6+0xd0/0xd0 [ 950.639555] ? alloc_vfsmnt+0x762/0x9c0 [ 950.643509] ? path_lookupat+0x238/0xba0 [ 950.647548] ? mnt_free_id.isra.21+0x50/0x50 [ 950.651947] ? trace_hardirqs_off+0x10/0x10 [ 950.656250] ? putname+0xee/0x130 [ 950.659681] ? cap_capable+0x1b5/0x230 [ 950.663545] ? security_capable+0x8e/0xc0 [ 950.667668] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 950.672836] ? ns_capable_common+0xcf/0x160 [ 950.677145] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 950.682309] mount_ns+0x6d/0x190 [ 950.685651] rpc_mount+0x9e/0xd0 [ 950.688990] mount_fs+0x66/0x2d0 [ 950.692333] vfs_kern_mount.part.26+0xc6/0x4a0 [ 950.696893] ? may_umount+0xa0/0xa0 [ 950.700502] ? _raw_read_unlock+0x22/0x30 [ 950.704624] ? __get_fs_type+0x8a/0xc0 [ 950.708489] do_mount+0xea4/0x2bb0 [ 950.712007] ? __might_fault+0x110/0x1d0 [ 950.716053] ? copy_mount_string+0x40/0x40 [ 950.720259] ? check_same_owner+0x320/0x320 [ 950.724555] ? __check_object_size+0x8b/0x530 [ 950.729035] ? __might_sleep+0x95/0x190 [ 950.732991] ? kasan_check_write+0x14/0x20 [ 950.737206] ? _copy_from_user+0x99/0x110 [ 950.741329] ? memdup_user+0x5e/0x90 [ 950.745020] ? copy_mount_options+0x1f7/0x2e0 [ 950.749496] SyS_mount+0xab/0x120 [ 950.752924] ? copy_mnt_ns+0xb30/0xb30 [ 950.756787] do_syscall_64+0x281/0x940 [ 950.760646] ? vmalloc_sync_all+0x30/0x30 [ 950.764766] ? _raw_spin_unlock_irq+0x27/0x70 [ 950.769237] ? finish_task_switch+0x1c1/0x7e0 [ 950.773709] ? syscall_return_slowpath+0x550/0x550 [ 950.778611] ? syscall_return_slowpath+0x2ac/0x550 [ 950.783519] ? prepare_exit_to_usermode+0x350/0x350 [ 950.788515] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 950.793869] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 950.798703] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 950.803866] RIP: 0033:0x454e79 [ 950.807030] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 950.814712] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 950.821954] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 950.829195] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 950.836441] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 950.843683] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000032 2018/03/30 21:36:39 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:39 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x0, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 0 (fault-call:16 fault-nth:51): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) close(r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x0, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x0, 0x1, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 951.065593] FAULT_INJECTION: forcing a failure. [ 951.065593] name failslab, interval 1, probability 0, space 0, times 0 [ 951.076922] CPU: 0 PID: 15118 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 951.084193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.093539] Call Trace: [ 951.096126] dump_stack+0x194/0x24d [ 951.099751] ? arch_local_irq_restore+0x53/0x53 [ 951.104419] ? __save_stack_trace+0x7e/0xd0 [ 951.108740] should_fail+0x8c0/0xa40 [ 951.112449] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 951.117547] ? kasan_kmalloc+0xad/0xe0 [ 951.121433] ? kmem_cache_alloc_trace+0x136/0x740 [ 951.126270] ? __memcg_init_list_lru_node+0x169/0x270 [ 951.131445] ? __list_lru_init+0x544/0x750 [ 951.135653] ? sget_userns+0x6b1/0xe40 [ 951.139519] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 951.144257] ? do_mount+0xea4/0x2bb0 [ 951.147943] ? SyS_mount+0xab/0x120 [ 951.151554] ? do_syscall_64+0x281/0x940 [ 951.155599] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 951.160953] ? find_held_lock+0x35/0x1d0 [ 951.165010] ? __lock_is_held+0xb6/0x140 [ 951.169062] ? check_same_owner+0x320/0x320 [ 951.173361] ? rcu_note_context_switch+0x710/0x710 [ 951.178282] should_failslab+0xec/0x120 [ 951.182244] kmem_cache_alloc_trace+0x4b/0x740 [ 951.186805] ? __kmalloc_node+0x33/0x70 [ 951.190768] ? __kmalloc_node+0x33/0x70 [ 951.194735] ? rcu_read_lock_sched_held+0x108/0x120 [ 951.199735] __memcg_init_list_lru_node+0x169/0x270 [ 951.204754] ? list_lru_add+0x7c0/0x7c0 [ 951.208710] ? __kmalloc_node+0x47/0x70 [ 951.212659] __list_lru_init+0x544/0x750 [ 951.216715] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 951.222590] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 951.227590] ? lockdep_init_map+0x9/0x10 [ 951.231627] sget_userns+0x6b1/0xe40 [ 951.235312] ? set_anon_super+0x20/0x20 [ 951.239264] ? put_filp+0x90/0x90 [ 951.242694] ? destroy_unused_super.part.6+0xd0/0xd0 [ 951.247788] ? alloc_vfsmnt+0x762/0x9c0 [ 951.251750] ? path_lookupat+0x238/0xba0 [ 951.255788] ? mnt_free_id.isra.21+0x50/0x50 [ 951.260181] ? trace_hardirqs_off+0x10/0x10 [ 951.264497] ? putname+0xee/0x130 [ 951.267944] ? cap_capable+0x1b5/0x230 [ 951.271906] ? security_capable+0x8e/0xc0 [ 951.276041] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 951.281223] ? ns_capable_common+0xcf/0x160 [ 951.285537] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 951.290707] mount_ns+0x6d/0x190 [ 951.294060] rpc_mount+0x9e/0xd0 [ 951.297418] mount_fs+0x66/0x2d0 [ 951.300775] vfs_kern_mount.part.26+0xc6/0x4a0 [ 951.305346] ? may_umount+0xa0/0xa0 [ 951.308956] ? _raw_read_unlock+0x22/0x30 [ 951.313085] ? __get_fs_type+0x8a/0xc0 [ 951.316957] do_mount+0xea4/0x2bb0 [ 951.320470] ? __might_fault+0x110/0x1d0 [ 951.324516] ? copy_mount_string+0x40/0x40 [ 951.328737] ? check_same_owner+0x320/0x320 [ 951.333039] ? __check_object_size+0x8b/0x530 [ 951.337528] ? __might_sleep+0x95/0x190 [ 951.341489] ? kasan_check_write+0x14/0x20 [ 951.345696] ? _copy_from_user+0x99/0x110 [ 951.349821] ? memdup_user+0x5e/0x90 [ 951.353506] ? copy_mount_options+0x1f7/0x2e0 [ 951.357974] SyS_mount+0xab/0x120 [ 951.361408] ? copy_mnt_ns+0xb30/0xb30 [ 951.365276] do_syscall_64+0x281/0x940 [ 951.369137] ? vmalloc_sync_all+0x30/0x30 [ 951.373262] ? _raw_spin_unlock_irq+0x27/0x70 [ 951.377732] ? finish_task_switch+0x1c1/0x7e0 [ 951.382201] ? syscall_return_slowpath+0x550/0x550 [ 951.387115] ? syscall_return_slowpath+0x2ac/0x550 [ 951.392030] ? prepare_exit_to_usermode+0x350/0x350 [ 951.397046] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 951.402404] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 951.407241] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 951.412419] RIP: 0033:0x454e79 2018/03/30 21:36:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 951.415592] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.423279] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 951.430525] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 951.437775] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 951.445030] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 951.452284] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000033 2018/03/30 21:36:39 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x0, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:39 executing program 0 (fault-call:16 fault-nth:52): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:39 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x0, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 951.636463] FAULT_INJECTION: forcing a failure. [ 951.636463] name failslab, interval 1, probability 0, space 0, times 0 [ 951.647753] CPU: 0 PID: 15160 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 951.655008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.664350] Call Trace: [ 951.666942] dump_stack+0x194/0x24d [ 951.670567] ? arch_local_irq_restore+0x53/0x53 [ 951.675230] ? __save_stack_trace+0x7e/0xd0 [ 951.679554] should_fail+0x8c0/0xa40 [ 951.683265] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 951.688365] ? kasan_kmalloc+0xad/0xe0 [ 951.692250] ? kmem_cache_alloc_trace+0x136/0x740 [ 951.697077] ? __memcg_init_list_lru_node+0x169/0x270 [ 951.702240] ? __list_lru_init+0x544/0x750 [ 951.706459] ? sget_userns+0x6b1/0xe40 [ 951.710328] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 951.715062] ? do_mount+0xea4/0x2bb0 [ 951.718753] ? SyS_mount+0xab/0x120 [ 951.722358] ? do_syscall_64+0x281/0x940 [ 951.726405] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 951.731753] ? find_held_lock+0x35/0x1d0 [ 951.735793] ? __lock_is_held+0xb6/0x140 [ 951.739830] ? check_same_owner+0x320/0x320 [ 951.744128] ? rcu_note_context_switch+0x710/0x710 [ 951.749042] should_failslab+0xec/0x120 [ 951.753019] kmem_cache_alloc_trace+0x4b/0x740 [ 951.757584] ? __kmalloc_node+0x33/0x70 [ 951.761533] ? __kmalloc_node+0x33/0x70 [ 951.765488] ? rcu_read_lock_sched_held+0x108/0x120 [ 951.770494] __memcg_init_list_lru_node+0x169/0x270 [ 951.775495] ? list_lru_add+0x7c0/0x7c0 [ 951.779443] ? __kmalloc_node+0x47/0x70 [ 951.783393] __list_lru_init+0x544/0x750 [ 951.787436] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 951.793296] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 951.798287] ? lockdep_init_map+0x9/0x10 [ 951.802322] sget_userns+0x6b1/0xe40 [ 951.806009] ? set_anon_super+0x20/0x20 [ 951.809964] ? put_filp+0x90/0x90 [ 951.813389] ? destroy_unused_super.part.6+0xd0/0xd0 [ 951.818471] ? alloc_vfsmnt+0x762/0x9c0 [ 951.822429] ? path_lookupat+0x238/0xba0 [ 951.826474] ? mnt_free_id.isra.21+0x50/0x50 [ 951.830863] ? trace_hardirqs_off+0x10/0x10 [ 951.835172] ? putname+0xee/0x130 [ 951.838605] ? cap_capable+0x1b5/0x230 [ 951.842470] ? security_capable+0x8e/0xc0 [ 951.846594] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 951.851761] ? ns_capable_common+0xcf/0x160 [ 951.856073] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 951.861252] mount_ns+0x6d/0x190 [ 951.864600] rpc_mount+0x9e/0xd0 [ 951.867944] mount_fs+0x66/0x2d0 [ 951.871285] vfs_kern_mount.part.26+0xc6/0x4a0 [ 951.875847] ? may_umount+0xa0/0xa0 [ 951.879452] ? _raw_read_unlock+0x22/0x30 [ 951.883578] ? __get_fs_type+0x8a/0xc0 [ 951.887441] do_mount+0xea4/0x2bb0 [ 951.890956] ? __might_fault+0x110/0x1d0 [ 951.895008] ? copy_mount_string+0x40/0x40 [ 951.899222] ? check_same_owner+0x320/0x320 [ 951.903517] ? __check_object_size+0x8b/0x530 [ 951.907988] ? __might_sleep+0x95/0x190 [ 951.911948] ? kasan_check_write+0x14/0x20 [ 951.916158] ? _copy_from_user+0x99/0x110 [ 951.920280] ? memdup_user+0x5e/0x90 [ 951.923965] ? copy_mount_options+0x1f7/0x2e0 [ 951.928435] SyS_mount+0xab/0x120 [ 951.931871] ? copy_mnt_ns+0xb30/0xb30 [ 951.935737] do_syscall_64+0x281/0x940 [ 951.939607] ? vmalloc_sync_all+0x30/0x30 [ 951.943731] ? _raw_spin_unlock_irq+0x27/0x70 [ 951.948207] ? finish_task_switch+0x1c1/0x7e0 [ 951.952693] ? syscall_return_slowpath+0x550/0x550 [ 951.957606] ? syscall_return_slowpath+0x2ac/0x550 [ 951.962513] ? prepare_exit_to_usermode+0x350/0x350 [ 951.967505] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 951.972844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 951.977665] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 951.982826] RIP: 0033:0x454e79 [ 951.985988] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.993672] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 952.000916] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 952.008159] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 952.015401] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 952.022645] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000034 2018/03/30 21:36:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x0, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f00000005c0)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000400)='rpc_pipefs\x00', 0x18, &(0x7f00000007c0)="3ce62fa784e21659de71839cd83033d358b4b28283cd8f45ff519ed6a5db5fe38bbc8f3c75d262abfae39529d5258ab61f79a6d28138c1c112c40234c2fd4f8f05372c26a15ad4f57d3c2ff810f9707d17690e89adeed348828e1f35630e5c211ee86aa98536384d64439efd8044ed6c25a42ee327dc091b7f7cea95951d292c9abbb67d2f3e7e2b5bf80a3a8053537a634bb9cf3bc6afc26dc8793af01ed4a507ebfc9c57068de72989e60d7169bc824bdf2592e1331cb5d6644889f6d245f2adcb4f7ba88981445601c6d62311a53a39477f9263e49449350f6456d79b10623588e26fedb5436c") socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x6, 0x3c, 0x6, 0x0, 0x5, r4}, 0x2c) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000580)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:40 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r1 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:40 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:40 executing program 0 (fault-call:16 fault-nth:53): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:40 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x0, 0xffffffff00000001, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) [ 952.185450] FAULT_INJECTION: forcing a failure. [ 952.185450] name failslab, interval 1, probability 0, space 0, times 0 [ 952.196741] CPU: 1 PID: 15189 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 952.204010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 952.213356] Call Trace: [ 952.215942] dump_stack+0x194/0x24d [ 952.219566] ? arch_local_irq_restore+0x53/0x53 [ 952.224225] ? __save_stack_trace+0x7e/0xd0 [ 952.228544] should_fail+0x8c0/0xa40 [ 952.232251] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 952.237346] ? kasan_kmalloc+0xad/0xe0 [ 952.241226] ? kmem_cache_alloc_trace+0x136/0x740 [ 952.246059] ? __memcg_init_list_lru_node+0x169/0x270 [ 952.251238] ? __list_lru_init+0x544/0x750 [ 952.255466] ? sget_userns+0x6b1/0xe40 [ 952.259342] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 952.264089] ? do_mount+0xea4/0x2bb0 [ 952.267792] ? SyS_mount+0xab/0x120 [ 952.271408] ? do_syscall_64+0x281/0x940 [ 952.275458] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 952.280815] ? find_held_lock+0x35/0x1d0 [ 952.284877] ? __lock_is_held+0xb6/0x140 [ 952.288939] ? check_same_owner+0x320/0x320 [ 952.293256] ? rcu_note_context_switch+0x710/0x710 [ 952.298184] should_failslab+0xec/0x120 [ 952.302152] kmem_cache_alloc_trace+0x4b/0x740 [ 952.306726] ? __kmalloc_node+0x33/0x70 [ 952.310703] __memcg_init_list_lru_node+0x169/0x270 [ 952.315714] ? list_lru_add+0x7c0/0x7c0 [ 952.319684] ? __kmalloc_node+0x47/0x70 [ 952.323659] __list_lru_init+0x544/0x750 [ 952.327723] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 952.333601] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 952.338614] ? lockdep_init_map+0x9/0x10 [ 952.342671] sget_userns+0x6b1/0xe40 [ 952.346377] ? set_anon_super+0x20/0x20 [ 952.350348] ? put_filp+0x90/0x90 [ 952.353798] ? destroy_unused_super.part.6+0xd0/0xd0 [ 952.358899] ? alloc_vfsmnt+0x762/0x9c0 [ 952.362868] ? path_lookupat+0x238/0xba0 [ 952.366927] ? mnt_free_id.isra.21+0x50/0x50 [ 952.371326] ? trace_hardirqs_off+0x10/0x10 [ 952.375641] ? putname+0xee/0x130 [ 952.379090] ? cap_capable+0x1b5/0x230 2018/03/30 21:36:40 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x0, 0x0, 0x401, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) [ 952.382972] ? security_capable+0x8e/0xc0 [ 952.387112] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 952.392293] ? ns_capable_common+0xcf/0x160 [ 952.396611] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 952.401788] mount_ns+0x6d/0x190 [ 952.405133] rpc_mount+0x9e/0xd0 [ 952.408475] mount_fs+0x66/0x2d0 [ 952.411829] vfs_kern_mount.part.26+0xc6/0x4a0 [ 952.416403] ? may_umount+0xa0/0xa0 [ 952.420531] ? _raw_read_unlock+0x22/0x30 [ 952.424655] ? __get_fs_type+0x8a/0xc0 [ 952.428524] do_mount+0xea4/0x2bb0 [ 952.432050] ? __might_fault+0x110/0x1d0 [ 952.436085] ? copy_mount_string+0x40/0x40 [ 952.440304] ? check_same_owner+0x320/0x320 [ 952.444605] ? __check_object_size+0x8b/0x530 [ 952.449084] ? __might_sleep+0x95/0x190 [ 952.453051] ? kasan_check_write+0x14/0x20 [ 952.457268] ? _copy_from_user+0x99/0x110 [ 952.461396] ? memdup_user+0x5e/0x90 [ 952.465099] ? copy_mount_options+0x1f7/0x2e0 [ 952.469582] SyS_mount+0xab/0x120 [ 952.473025] ? copy_mnt_ns+0xb30/0xb30 [ 952.476901] do_syscall_64+0x281/0x940 [ 952.480771] ? vmalloc_sync_all+0x30/0x30 [ 952.484893] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 952.490407] ? syscall_return_slowpath+0x550/0x550 [ 952.495317] ? syscall_return_slowpath+0x2ac/0x550 [ 952.500234] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 952.505581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 952.510410] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 952.515575] RIP: 0033:0x454e79 [ 952.518747] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 952.526442] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 2018/03/30 21:36:40 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, 0xffffffffffffffff, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:40 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 952.533694] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 952.540939] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 952.548195] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 952.555441] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000035 2018/03/30 21:36:40 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 0 (fault-call:16 fault-nth:54): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0x0, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x1e, 0x3, 0x3, 0x1, 0x11, r0, 0x7fff}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000940)) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000580)='./file1\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) r5 = perf_event_open(&(0x7f0000000680)={0x7, 0x70, 0x2, 0x1, 0x9, 0x1, 0x0, 0x2, 0x1000, 0xa, 0x401, 0x8, 0x2, 0x1000, 0x7b, 0x2, 0x1, 0x67d3, 0x1ff, 0x6, 0x115, 0x101, 0xfff, 0xfffffffffffffffc, 0x5, 0x1f, 0x7, 0x4, 0xfffffffffffffffd, 0x781, 0x6, 0x100000000, 0x7, 0x8, 0x0, 0x4, 0x8001, 0x6, 0x0, 0xa4d, 0x4, @perf_config_ext={0x0, 0xffffffffffffd32b}, 0x0, 0x100000001, 0x8, 0x1, 0x3, 0x1000, 0x9}, 0xffffffffffffffff, 0x1, r3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={r1, 0x28, &(0x7f0000000240)}, 0x10) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") r6 = gettid() close(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x5, 0x70, 0x3, 0x2, 0x9, 0xee0, 0x0, 0x1e, 0x10, 0x6, 0x0, 0x6, 0x9, 0x3, 0x4, 0xfffffffffffffffe, 0x4, 0x3, 0x4, 0xfff, 0xfffffffffffffff7, 0x1, 0x1ff, 0xfffffffffffffe00, 0x3, 0x80, 0x8001, 0x80000000, 0xfff, 0x7, 0xdc59949, 0x0, 0x5, 0x7ff, 0x4, 0x101, 0x8, 0xd7b7, 0x0, 0x5, 0x1, @perf_config_ext={0x1, 0x1ff}, 0x1300, 0xfffffffffffffffa, 0x4, 0x7, 0xe814, 0x5, 0x1ff}, r6, 0x0, r3, 0x2) 2018/03/30 21:36:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, 0xffffffffffffffff, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x0, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:41 executing program 7: r0 = getpid() r1 = perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x80}, r0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xc37a) r2 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x7, 0x70, 0xebda, 0x8, 0x8, 0x4, 0x0, 0xe58, 0x10, 0x2, 0x100, 0x2, 0x7fff, 0x31c, 0x0, 0x26f1, 0xb07, 0xbb5, 0x3f, 0x3, 0x7f, 0x5, 0x8, 0x1, 0xfffffffffffffff7, 0xfffffffffffffe00, 0xa83a, 0x3f, 0x0, 0x3, 0x1, 0x3, 0xfffffffffffff001, 0x51, 0x0, 0x81, 0x9d4, 0x8, 0x0, 0x4, 0x2, @perf_config_ext={0x10000, 0xffff}, 0x8, 0x1, 0x9, 0x4, 0x0, 0x36e, 0x200}, r0, 0x7, r1, 0xa) recvmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x139, &(0x7f00000007c0), 0x0, &(0x7f0000000100)=""/63, 0x3f}, 0xfffffffffffffffe) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002340)='./file1\x00', 0x8) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440), 0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000002540)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000002480)={&(0x7f0000002380)='./file0/file0\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000002300)=0x4) r5 = gettid() ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000002680)={r1, r4}) mkdir(&(0x7f000075bff8)='./file0\x00', 0x0) recvmsg$kcm(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001240)=""/134, 0x35, 0xfff}, 0x2004) perf_event_open(&(0x7f000000a000)={0x1, 0x78, 0x0, 0x0, 0xb140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_bp={&(0x7f0000000000), 0x800000}, 0x0, 0x20000000, 0x6, 0x400010, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000180)) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000002580)) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4594dab1, 0x0, 0xc600000000000000, 0x1, 0x0, 0xd53f, 0x80008, 0x1, 0x8001, 0x44d1, 0x3, 0x1, 0x10001, 0x100, 0x40, 0x7, 0x15c000000000000, 0x0, 0x42, 0x7, 0x1, 0x8, 0x1, 0x7, 0x0, 0x81, 0x3, 0x5, 0x4, 0x1, 0x5, 0x0, 0xfffffffffffffff8, 0x1, 0x0, 0xffff, 0x0, 0x2, 0x1, @perf_config_ext={0x1ff}, 0x430, 0x401, 0x100000000, 0x1, 0x0, 0x890b, 0x80000000}, r5, 0x5, r3, 0x1) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000002600)={0xb, 0x68abe69a, 0x7, 0x1f89, 0x1, 0x1, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r6, &(0x7f00000002c0)="b4f134858983612715b97a694a31be9824dff2ff251031b936b232a7cbc2e0ef6bdd5906237ec1f897d8690caf64f836d305fca7caec82597d2cee74381819f7af1194dd299960836ac847631ee90e5d3a3431d0e3ad6f2bef4e44849d2b57d79f74641946cfd166f985936232f5807d60e651d55b", &(0x7f0000000340)=""/198}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002640)={&(0x7f00000025c0)='./file1\x00', r6}, 0x10) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001180)={&(0x7f0000001140)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001200)={r7, 0x0, 0x40, 0x1000, &(0x7f00000011c0)="110c68225f202f3c7be01c3389ccdca32544dc95f28f76c339293bf3d657fc95df9c7a4c3cef0af2c6346a89d2b52cdb06963cf1e53d198edf8df2c4a60085bb", &(0x7f0000001300)=""/4096, 0x3, 0x4}, 0x28) 2018/03/30 21:36:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 953.100298] FAULT_INJECTION: forcing a failure. [ 953.100298] name failslab, interval 1, probability 0, space 0, times 0 [ 953.111681] CPU: 0 PID: 15241 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 953.118954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.128298] Call Trace: [ 953.130891] dump_stack+0x194/0x24d [ 953.134520] ? arch_local_irq_restore+0x53/0x53 [ 953.139170] ? __save_stack_trace+0x7e/0xd0 [ 953.143478] should_fail+0x8c0/0xa40 [ 953.147171] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 953.152251] ? kasan_kmalloc+0xad/0xe0 [ 953.156116] ? kmem_cache_alloc_trace+0x136/0x740 [ 953.160934] ? __memcg_init_list_lru_node+0x169/0x270 [ 953.166097] ? __list_lru_init+0x544/0x750 [ 953.170307] ? sget_userns+0x6b1/0xe40 [ 953.174166] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 953.178896] ? do_mount+0xea4/0x2bb0 [ 953.182584] ? SyS_mount+0xab/0x120 [ 953.186185] ? do_syscall_64+0x281/0x940 [ 953.190219] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 953.195560] ? find_held_lock+0x35/0x1d0 [ 953.199599] ? __lock_is_held+0xb6/0x140 [ 953.203639] ? check_same_owner+0x320/0x320 [ 953.207937] ? rcu_note_context_switch+0x710/0x710 [ 953.212841] should_failslab+0xec/0x120 [ 953.216792] kmem_cache_alloc_trace+0x4b/0x740 [ 953.221347] ? __kmalloc_node+0x33/0x70 [ 953.225295] ? __kmalloc_node+0x33/0x70 [ 953.229245] ? rcu_read_lock_sched_held+0x108/0x120 [ 953.234241] __memcg_init_list_lru_node+0x169/0x270 [ 953.239233] ? list_lru_add+0x7c0/0x7c0 [ 953.243183] ? __kmalloc_node+0x47/0x70 [ 953.247136] __list_lru_init+0x544/0x750 [ 953.251171] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 953.257031] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 953.262032] ? lockdep_init_map+0x9/0x10 [ 953.266070] sget_userns+0x6b1/0xe40 [ 953.269756] ? set_anon_super+0x20/0x20 [ 953.273706] ? put_filp+0x90/0x90 [ 953.277131] ? destroy_unused_super.part.6+0xd0/0xd0 [ 953.282207] ? alloc_vfsmnt+0x762/0x9c0 [ 953.286156] ? path_lookupat+0x238/0xba0 [ 953.290192] ? mnt_free_id.isra.21+0x50/0x50 [ 953.294575] ? trace_hardirqs_off+0x10/0x10 [ 953.298868] ? putname+0xee/0x130 [ 953.302301] ? cap_capable+0x1b5/0x230 [ 953.306166] ? security_capable+0x8e/0xc0 [ 953.310291] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 953.315454] ? ns_capable_common+0xcf/0x160 [ 953.319751] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 953.324915] mount_ns+0x6d/0x190 [ 953.328256] rpc_mount+0x9e/0xd0 [ 953.331596] mount_fs+0x66/0x2d0 [ 953.334937] vfs_kern_mount.part.26+0xc6/0x4a0 [ 953.339491] ? may_umount+0xa0/0xa0 [ 953.343091] ? _raw_read_unlock+0x22/0x30 [ 953.347214] ? __get_fs_type+0x8a/0xc0 [ 953.351172] do_mount+0xea4/0x2bb0 [ 953.354688] ? __might_fault+0x110/0x1d0 [ 953.358722] ? copy_mount_string+0x40/0x40 [ 953.362932] ? check_same_owner+0x320/0x320 [ 953.367227] ? __check_object_size+0x8b/0x530 [ 953.371700] ? __might_sleep+0x95/0x190 [ 953.375650] ? kasan_check_write+0x14/0x20 [ 953.379857] ? _copy_from_user+0x99/0x110 [ 953.383981] ? memdup_user+0x5e/0x90 [ 953.387664] ? copy_mount_options+0x1f7/0x2e0 [ 953.392131] SyS_mount+0xab/0x120 [ 953.395555] ? copy_mnt_ns+0xb30/0xb30 [ 953.399443] do_syscall_64+0x281/0x940 [ 953.403301] ? vmalloc_sync_all+0x30/0x30 [ 953.407420] ? _raw_spin_unlock_irq+0x27/0x70 [ 953.411887] ? finish_task_switch+0x1c1/0x7e0 [ 953.416359] ? syscall_return_slowpath+0x550/0x550 [ 953.421263] ? syscall_return_slowpath+0x2ac/0x550 [ 953.426164] ? prepare_exit_to_usermode+0x350/0x350 [ 953.431155] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 953.436494] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 953.441313] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 953.446476] RIP: 0033:0x454e79 [ 953.449638] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 953.457319] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 953.464561] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 953.471803] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 953.479047] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 953.486287] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000036 2018/03/30 21:36:41 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0x0, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:41 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x7fff, 0x1, 0xffffffffffffffff, 0x84ee7a2, [0x115]}, 0xffffffffffffffb2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r1, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r1}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x0, 0x0, @perf_config_ext={0x5}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 0 (fault-call:16 fault-nth:55): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x2, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)={0xffffffffffffffff}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r4 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) recvmsg(r3, &(0x7f0000000740)={&(0x7f0000000400)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @broadcast}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/16, 0x10}, {&(0x7f0000000580)}], 0x2, &(0x7f0000000700), 0x0, 0x2}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000280)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) 2018/03/30 21:36:41 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, r0, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x4, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xb, 0x100007e, 0x3, 0x6, 0x15, 0xffffffffffffffff, 0x2}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socketpair(0x8, 0x2, 0x0, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000001c40)={0xffffffffffffffff}) mkdir(&(0x7f0000000700)='./file0\x00', 0x10e) r4 = getpid() perf_event_open(&(0x7f0000001bc0)={0x3, 0x70, 0x6, 0x22, 0x2, 0xf5, 0x0, 0x1, 0x20008, 0x4, 0x9, 0x9, 0x1, 0x6, 0x401, 0x7, 0x51, 0x0, 0x5, 0x1, 0x7, 0x6, 0x10001, 0x1000, 0x0, 0x7fff, 0x0, 0x3ff, 0x0, 0xd643, 0xffffffff, 0xfff, 0xf2f3, 0x9, 0x8d, 0x7, 0x1ff, 0x5, 0x0, 0x7fff, 0x6, @perf_config_ext={0xffffffff00000001, 0x1}, 0x1000, 0x2, 0x5, 0x6, 0x4, 0x80000000, 0xffffffffffffffc4}, r4, 0xc, r1, 0x1) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x20, 0x0, 0x2, 0x7, 0x0, 0x400, 0x200, 0x5, 0x5000000000000000, 0x80000000, 0x401, 0x0, 0x6, 0x0, 0x7f, 0x0, 0x7, 0x2, 0x0, 0x6, 0xe5fa, 0x80, 0x6, 0x8, 0x0, 0x9, 0x5, 0x0, 0x0, 0x9, 0xd1, 0x6, 0xfffffffffffff801, 0x8, 0x6, 0x1ff, 0x0, 0x7, 0x4, @perf_config_ext={0x7, 0xfff}, 0x5020, 0xfff, 0x81, 0x0, 0x0, 0x7, 0x6}, r4, 0xa, r1, 0x1) r5 = gettid() gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0xc85, 0x3ff, 0x1, 0x0, 0x0, 0x80, 0x1, 0x712000000000000, 0x7, 0x56d29a0f, 0x1, 0xffffffff80000001, 0x2, 0x20, 0x7, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x9, 0x5, 0x1, 0x3e69b47c, 0x5, 0x7fff, 0x1, 0x5, 0x4f, 0x1000, 0x0, 0x4, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffffffffff81, 0x8}, 0x20200, 0xf88, 0x0, 0x1, 0x92d5, 0x1, 0x5}, r5, 0xd, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000540)=r2, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r2}, 0xb) perf_event_open(&(0x7f0000001c80)={0x0, 0x70, 0x3ab, 0x3, 0xbf7e, 0xffffffff, 0x0, 0x0, 0x4000, 0x4, 0x2, 0xec, 0x3ff, 0x8, 0xba, 0x973, 0x6, 0x433, 0x6, 0x4, 0x3, 0x5, 0x1, 0x4, 0x7, 0x5, 0x20, 0xa593, 0x4, 0x1000, 0x4722, 0x3, 0x40, 0xdd, 0x20, 0x1, 0x1, 0x6, 0x0, 0x2, 0x0, @perf_config_ext={0x9}, 0x10000, 0xfffffffffffffffb, 0x401, 0x7, 0x3, 0x9, 0x3}, r5, 0xf, r2, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000240)='./file0\x00', 0x0, 0x18}, 0xfffffffffffffe02) perf_event_open(&(0x7f0000000480)={0x1c218abbd1b2c600, 0x33, 0x26f, 0x0, 0xe9d, 0x9, 0x0, 0x80000001, 0x1408, 0x0, 0x10001, 0x1ff, 0xfff, 0x80000000, 0x5, 0x3, 0x81, 0x6, 0x9151, 0x41, 0x2, 0xfda, 0x7, 0x3, 0x1, 0x100000000, 0x4, 0x2, 0xffffffffffffe17f, 0x2, 0x1, 0x3, 0x1, 0x0, 0x7, 0x2, 0x83, 0x8002, 0x0, 0xfffffffffffffffb, 0x1, @perf_bp={&(0x7f0000000440), 0xf}, 0x4441, 0x1000, 0xb36, 0x7, 0x5f9, 0x8a, 0x40}, r5, 0xd, r6, 0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, 0x0) recvmsg$kcm(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001a40)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000001980)=""/59, 0x3b}, {&(0x7f00000019c0)=""/66, 0x42}], 0x3, &(0x7f0000001a80)=""/195, 0xc3, 0x2}, 0x2102) mount(&(0x7f0000000280)='./file1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000240)='udf\x00', 0x100001c, 0x0) mkdir(&(0x7f0000001f00)='./file0/file0/file0\x00', 0x1) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='fusectl\x00', 0x4000, 0x0) mount(&(0x7f0000000380)='./file0/file0/file0\x00', &(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)='affs\x00', 0x800040, &(0x7f0000001e00)="39ef282caa985296c941be0013a569575f8b267468fe262184491b76dc736e1b4eb9e85bd685609c27f529ef08aff500d3910886a523046831d8c1731e93f35a150a5e2d31d2f90a1662699756b8408eb725f6b128416920a8111c2e5eb71e90008543ca6fd6e14006c64b644e6e73865ab19393ac4a2ca4ae2f83c961a534eda4a1b65dda0645296a5c171c92118a7319a700d9d422b0b720501f621e310a4ca0e1197ee66f7553b67ef1ddd0368e128eba449e35cef95b4a03b6a5c42a7e0292bf43e16df2e950d54cb7dd") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000400)) 2018/03/30 21:36:42 executing program 2: socketpair(0x4, 0x1, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000040)=@in={0x0, 0x0, @loopback}, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/111, 0x6f}, {&(0x7f0000000140)=""/234, 0xea}], 0x2, &(0x7f0000000280)=""/80, 0x50}, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/125, 0x7d}, {&(0x7f00000003c0)=""/83, 0x53}, {&(0x7f0000000440)}, {&(0x7f0000000480)=""/60, 0x3c}], 0x4, &(0x7f0000000500)=""/7, 0x7, 0x41}, 0x0) recvmsg(r1, &(0x7f0000001b80)={&(0x7f0000000580)=@ax25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000600)=""/57, 0x39}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/140, 0x8c}, {&(0x7f0000001700)=""/65, 0x41}, {&(0x7f0000001780)=""/176, 0xb0}, {&(0x7f0000001840)=""/207, 0xcf}, {&(0x7f0000001940)=""/254, 0xfe}, {&(0x7f0000001a40)=""/34, 0x22}], 0x8, &(0x7f0000001b00)=""/70, 0x46, 0x4}, 0x10000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001d00)={r0, 0x0, 0x55, 0xa2, &(0x7f0000001bc0)="f235d143a85eb6cb3c031c404a63387d9c24aa2eaf55f3b986fd9847a2cc120a7108a9c9b198f9f77c8c3469a115f822c3cba10cfc7fa4c17f16bf6f30d3b0de1130e0b56f57bd20ba26ae057672e34d482cf106c8", &(0x7f0000001c40)=""/162, 0x0, 0x8}, 0x28) r2 = gettid() r3 = perf_event_open(&(0x7f0000001d40)={0x3, 0x70, 0x8, 0x100, 0x7fffffff, 0x4, 0x0, 0x31e, 0x20000, 0x8, 0x3, 0x1, 0xd90d, 0x0, 0xfffffffffffff000, 0xc506, 0x10001, 0xc60, 0x4, 0x3, 0xfffffffffffffffc, 0xca, 0x7, 0x0, 0xffffffff, 0x0, 0x6, 0x4, 0xffffffff, 0x1, 0xfe5b, 0x7, 0xfffffffffffffff9, 0x4000000, 0x81, 0x100000000, 0x5, 0x68, 0x0, 0x1, 0x2, @perf_config_ext={0xbe, 0x100}, 0x10021, 0x1, 0x6, 0x4, 0x4, 0x1, 0x8}, r2, 0x6, r1, 0x8) socketpair$inet(0x2, 0x8080f, 0x400, &(0x7f0000001dc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000001e00)=""/30, 0x1e}, {&(0x7f0000001e40)=""/31, 0x1f}, {&(0x7f0000001e80)=""/225, 0xe1}, {&(0x7f0000001f80)=""/95, 0x5f}, {&(0x7f0000002000)=""/11, 0xb}, {&(0x7f0000002040)=""/178, 0xb2}], 0x6, &(0x7f0000002180)=""/200, 0xc8, 0x1}, 0x40) mount(&(0x7f00000022c0)='./file0\x00', &(0x7f0000002300)='./file0\x00', &(0x7f0000002340)='cgroup\x00', 0x100000, &(0x7f0000002380)="b43f914960b7773dbae8d0ad9dac73340775f81b36b20427962b4628603cfc1310b68ee7491e0d1b6f02da8ed9c83b5d1b226ffd9307d3e8348e894fd239ed531df6a4dc9e5d4a9a720fa8f507ec9f42f9ed579db353517c62ad124bcaa6631f425388d521e386195dfc6af696c75bdd88434e585575a0b9d2701637c3b13475b629c3") r6 = perf_event_open(&(0x7f0000002480)={0x1, 0x70, 0x4, 0xffff, 0x7fc, 0x8, 0x0, 0x80000000, 0x2c200, 0xa, 0x8, 0x7, 0x83e, 0xd7d, 0x9, 0x5, 0x7, 0x1, 0xb2a1, 0x100000000, 0x0, 0x847, 0x20, 0x8, 0x0, 0x4, 0x800, 0xfffffffffffffffb, 0x9, 0x400, 0x8, 0x7, 0x7, 0xa3, 0x62, 0xffffffff, 0x25b, 0x3, 0x0, 0x2226, 0x0, @perf_bp={&(0x7f0000002440), 0x2}, 0x40, 0x8, 0xfffffffffffffffc, 0x7, 0x5, 0x4, 0x100000001}, r2, 0x1, r0, 0x9) mkdir(&(0x7f0000002500)='./file0\x00', 0x0) perf_event_open(&(0x7f0000002580)={0x1, 0x70, 0x4, 0x3, 0x2d87209c, 0x7, 0x0, 0x4, 0xa, 0x1, 0x4, 0x3, 0x7, 0x7, 0x6, 0x3f, 0x7fff, 0x800, 0x8, 0x9, 0x80000001, 0x5, 0xffffffffffffff02, 0x100000001, 0x6, 0x1f, 0x80000001, 0x8, 0x7fff, 0x6, 0x1, 0x2, 0x200, 0x7, 0x20, 0x2, 0x1e, 0xef, 0x0, 0x8c, 0x1, @perf_bp={&(0x7f0000002540), 0x1}, 0x511, 0x200, 0xffffffff, 0x3, 0x90, 0x8, 0x3301}, r2, 0x1, r6, 0x1) mount(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='./file0\x00', &(0x7f0000002680)='aufs\x00', 0x800000, &(0x7f00000026c0)="d302b59a42b4d53674") sendmsg$kcm(r1, &(0x7f0000003ec0)={&(0x7f0000002700)=@l2={0x1f, 0x5f07, {0xcf, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc, 0x80000001}, 0xccd, 0x100000001}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000002780)="58fb9f4e880f60bcf1431265baf3a32b31fab6e81d9621048bfbfd74d322fa53a5363c38b7448bdd18adeec392e24175bd70600898f02d451b17fdf409cef34172f2a9dc54d595dad64fac83fca8cdaa5b43fa8c46e547cba990fce34aa967f578a5b5c3a475a9ffee0b54798aa73d509c35a3ed65ea56044083542bd6e618d3696a73c3a39e1aea4a52b1758c4ae69a2023ce9e8ecad9888611a1f36bc31242dfbff26eb6", 0xa5}, {&(0x7f00000028c0)="603eb19d59669058113f5e10742ee5e5d4b260f5886d450f4fcf27d74091014d736aa711c08a688fea17210ccbdf0f25bdd645b46e0b5e2e4aa4cfa7b3c85daf4562931bc552d2a8401f79be2a6e40bbcad6135a094a12b6352c7eea6c65e1", 0x5f}, {&(0x7f0000002980)="6b1f604a31706b07503dc60c7d66dbd1a41534a3b4a93f2f11ae365f3afad158182c4b38922a381dfc0461cc7df5924a4e265c5d488706c47817522317f8332ef1ac02b8a5050dfcd9e9044a9a4e7ad237d2e021b1cf13c49b79cc2b307cdbe120237430c39462877c7b50063d18f42fa88ccd71bdcb97151e4748dd822e59e5fc9c2eca1119b1df6604b1c2dde4eceba34ad43c37b508aa9c800d07d2a21413e811c8b28b82b0d2527ce7c1950cc50c7cba4941788e1ab6703c9e5dc88bdf2dc0927a36c557b763e030b2dbdda7a9a1e2d22417ddaec98909", 0xd9}, {&(0x7f0000003a80)}, {&(0x7f0000003c00)="adbb7a5ef329618de487322357d8efe26377db4f96f362ec45d6d10c19de04b0f5576cc3dd624109b14903e989a0df131e9afced5ebd12ae3969cbf668d70b9c371c11b9751f2fed9f457270c7bfc1fd29e6845d515e6eab875dbacaf880118897b24dfcdaf66994d654a89d3082decc6234b8da77f13e9df376ecdd7e75a8a1fa1b4866bdca0cefd980f030f444a09adbaa0237cdfe877554f6eec801fe0db3960942927ab606f06a699e1dd53216310b622651bd695cd96986cd5edb7770f070009be46951a2", 0xc7}], 0x5, &(0x7f0000003dc0), 0x0, 0x4000}, 0x2400c000) recvmsg(r4, &(0x7f0000005300)={&(0x7f0000003f00)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000005240)=[{&(0x7f0000003f80)=""/154, 0x9a}, {&(0x7f0000004040)=""/4096, 0x1000}, {&(0x7f0000005040)=""/156, 0x9c}, {&(0x7f0000005100)=""/98, 0x62}, {&(0x7f0000005180)=""/140, 0x8c}], 0x5, &(0x7f00000052c0)=""/53, 0x35, 0x1}, 0x40010100) mount(&(0x7f0000005340)='./file0\x00', &(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)='adfs\x00', 0x1000, &(0x7f0000005400)="3de21dc776429d81397a0c70d123098b81034640d4120166dd659ef555d49ecded65816c14609d6a6a783f728185725e6164315b2ed604ba7df323aa559bfe5a99590acb2fec5b309ecdb5d4220bc3220990edde633b5102e33903bb675d914e80632f37549602bb1e63a85cc4674b9845225b6c76b206cd8ba9fd874c75ab2cf5956c8f5291db19d70bc958d46312c17a659468d19bfb03a4f113fdf08b9ed87799db4a34a840ac81e52d6a2c845fd9734cb99686259c105c39f707323cce3147b8914ace8cc39e8996d4c72cb4f724923a7366dd9ec0698cb2a5c1ad9621f5f08862522363e357a88aee") r7 = socket$kcm(0x29, 0x2, 0x0) mount(&(0x7f0000005500)='./file0\x00', &(0x7f0000005540)='./file0/file0\x00', &(0x7f0000005580)='gfs2meta\x00', 0x20, 0x0) recvmsg$kcm(r0, &(0x7f0000005840)={&(0x7f00000055c0)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000005740)=[{&(0x7f0000005640)=""/247, 0xf7}], 0x1, &(0x7f0000005780)=""/133, 0x85, 0x8001}, 0x10000) perf_event_open(&(0x7f0000005880)={0x1, 0x70, 0xfffffffffffffffa, 0x53a, 0xf22, 0x200, 0x0, 0x10000000000, 0x20400, 0x2, 0x7f, 0x6, 0xfff, 0x800, 0xd10a, 0x6, 0x3c28, 0xdf, 0xfffffffffffeffff, 0x6, 0x9, 0x200, 0x7ff, 0xfffffffffffff800, 0x7, 0x6, 0x0, 0x3f, 0x3ff, 0x1e17, 0x3ff, 0x1, 0xffff, 0x6, 0xfffffffffffffc30, 0xffff, 0x0, 0x7fffffff, 0x0, 0x388, 0x5, @perf_config_ext={0x39b, 0x100000001}, 0x0, 0x5, 0x8, 0x0, 0x101, 0x9, 0x5}, r2, 0x8, r3, 0x8) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000005a80)={r1, &(0x7f0000005900)="611e36be3eb8bf1c1a1ac67ed49008d083273938877b295cc23b194d50566ebb266fd0382fbdf5d8878389a7943089328c746b9401ef0fdbe370bfebdd52acaf27714f0c91b6c751c81ff1bc4a0b683429e883973e934097bcf6679fb55b8e93458c2ba3b949261a71ab7efefb7aa5b8fbc220270c9a2589ab5f59ded1ebd7f218a6c1c85dd4dae3960d1efa98c841b747bbb7dc651fff51f4ddae96cf8d4789fa73f84ff1d648b19ebbd9910ec660052198aeab7dd6991ebbb062276943f10fd283e5db213c43b624363c083de853dd3d2774cd5e68ac28cbf81b79ea451b8e", &(0x7f0000005a00)=""/123}, 0x18) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000005ac0)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() ioctl$PERF_EVENT_IOC_ID(r9, 0x80082407, &(0x7f0000005b00)) sendmsg(r7, &(0x7f0000005e80)={&(0x7f0000005b40)=@vsock={0x28, 0x0, 0x2710, @any=0xffffffff}, 0x80, &(0x7f0000005d40)=[{&(0x7f0000005bc0)="866748effbdb69e40773085b03ba1462cebdd0244ac7ca283dbb52375cbf28c84c5307fea4095473b99e9cb48a49edf88bd8403696ddc0c9970433b11839c5033eba6eb1f90baf91b163a788398fb3c9b73fc6fed074ba7cd3478779515abefb97f3b5d5bc2f361e08dbf1a90bbbc6fc826f8c2200869a8ebeab42ed32072229e6aa98f329c1aac94f450914ffe9a5bacdfe503d1b7362f3f6c63071c35335237c57", 0xa2}, {&(0x7f0000005c80)="865ab938f9b01b97a3e75a6d8e74c03825e86c7aadc24ae75ee6d446c10fcd4b1a9ce54c01eacf240802cedec2560da80de8898589e2ee88b85c8d4c01e9cf2810142a35d21254e4edfdaa3d95743c5b747d", 0x52}, {&(0x7f0000005d00)="4764ab3d898e55d50ca29895609ad03c4f34eecb7ab51ac842dd7c94e7", 0x1d}], 0x3, &(0x7f0000005d80)=[{0xe8, 0x101, 0x3, "64fc72f1bd061413cbca4596714ba647425fa46e1fa3150e81b9bdd8051f4695e06da78b755d46a2dfea7b542657dcd5a3a3c6cf9ba040e5977f1a7c699aaeea88f5f8861beb8e80fba8d78f4ad581f7331e6fdf327e6a4f6c58315f65312a9635b22c81fa880a243552dccc20bf7c8ebee799a7cf0c316ab52c97b6c4265bf4c65fb4188ee49354b040d298a6ed3bb8babbeb3ae9435121d7ae0ba92ae974851147bee6539793eb79a93cf09f59a8f56eceaaf2d4c5fb3e2bd2d6a71721a88fa6202be78ba3f6a88021ab2f3fff174429"}], 0xe8, 0x40000}, 0x4804) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000005f40)={r1, 0x50, &(0x7f0000005ec0)}, 0x10) mount(&(0x7f0000005f80)='./file0\x00', &(0x7f0000005fc0)='./file0/file0\x00', &(0x7f0000006000)='afs\x00', 0x40, &(0x7f0000006040)="78e0da4c39ffa46419bf4a0be3f5a1ec8b602d502d069fc2651e1a88fe308cb50f612579c751054509ca9b6c5619ed22f44f7b335104a754021c9863bad179e5c756c9bffa633deb92c2ab05854859a0da1e367efd7ca8591a424de613cb3c4edf344f739ece4b3b1c13e986f224ed080dbca95229b56f76e8c25ebb51a1286803f405e5c3ba482c9993b37e9ee3cd5db5d14678f013348d5e858d4861679b37ba24f364e8d2ac7090a76a1f6159fcc8571765f1e6f6f59d") sendmsg(r8, &(0x7f0000006ac0)={&(0x7f0000006100)=@ethernet={0x306}, 0x80, &(0x7f0000006580)=[{&(0x7f0000006180)}, {&(0x7f00000061c0)="7f8f4b8434e7d591bcdb768df75d465bee97ec6fb0936f827523949c22b98e28323deb88e6384383c855fe174dbf706d7a8ee790f93e88f317f1e8124ed593ce98684c1e33dd80e2a82bfb56b10c27a8d4916cd88f7443bdba9d2fef6eea753244bdd042e199fd5ecfb75dc642a17e478f8a9e7d99607eddd0095da73fe962b6699f0a0567b0410be3883d40b980796f649e33ea66efed23c85062791a4bd74962f9de9682e5507ff6bbe02ef0a93bb6ff9573", 0xb3}, {&(0x7f0000006280)="e113dbefe70a2316025e20a55d308ca4bd2a4ce1bb665d0efc3433f3643562e8d91f6cf46378092d1379701bc95d1073c605f9755c1cf01b4fc326d56eceb22e28bc498f881ba8211e644677115aa47387b72f7450417738ad90e0e5e945781beaacfcecb1a2d54210ec2bee42472d4149395cbd2edd4f875da2d1795415999490632cf84e6746d633120700650790cde9dde29b0c5fb6bc41aa59cad6931ff5dbf4a18a37d11c819998ca", 0xab}, {&(0x7f0000006340)="118d83bfb443d5ffc696f83d647a241d8872e37d08e5cf7344e411c7ae91815d39f5a7a5a32905d48ae720719c7e019c03c37d478a8e44e22ca15a79ca85525a401f76c71d3e51ceef24de38656047928693a6e40ac94747c12638ba45a80d188396d2fa5c462df48e5e25339ac1db77d71553fa86ea4645f852f0d1a8", 0x7d}, {&(0x7f00000063c0)="3bbdd53d060f9d6a700bd12370616084e706abefa716789843a8570d2e394918f95cd7c0ebd10f7344f79291e47d1f98183ac3a7688c9df22f986e10cb600e7ec9b7a22ded3125ecffe52f33c79d358c56de7ee7653c9e4590da4ee02fc7c233d350ddf1acf55413ee4305af94a0002d52fcc2273ce19f652bab657790f529e8155ac707cb6cb17d00c5c97ac8f486628becc220f2412966699be950866697b70fa66fab2701d03bce8a91a48135291f68ed32333098bb1a", 0xb8}, {&(0x7f0000006480)="d9bdb34035e64dbb36a0fe2933b94039deae81229f17bf32d094b984d7dc80be5e0f546ba91d18d5672da343d980a40d03c7b602d432ac961cf751d82d508b9bce4888e90361e57c3fc5950669728385b2d26a400dd8ec2624c52b2ad8edcce9251cfbb9c35a627d899040270c337871980049e538df8cd707b9d4c6c1f67d670d94ef04237dc8a4df80d2b46e58588da76a44ff5373b42ba07c4d5a258965091343ad38b9ffe9665145ec5fb2fa6181f69ea3559c3002867e06aef584dc2e97642314db171287f6704adf6b55f0a6a2e4120770da132d8d76b2b4c759621fd608da67f3e3c9a9", 0xe7}], 0x6, &(0x7f0000006600)=[{0x68, 0x3a, 0x1000, "dfebcca93bff0e54f91fa21460c5b789358e26f8ba1c111234c879a4a31a670c0a0c796cb112959fb46b8a5dbb77464bc11d284cb58f48fc59d7a317b69b74ce90c7a68ab8e53689134cc5891ecb764783316ba13ec29a7a"}, {0x100, 0x10f, 0x3, "a064a8fa8750234b4c9f25e02b9def9367190c9cebe36a7ca6ddf1c85e815b0156e0f6246d9a0a6e53f49fa95345f1f2516222aa02151af4b585db8d402eb1df9a55ddf8d907bcfbb351ab7d78137eb78f308a68a68cebc49594372c83a40dbca1069555f85b65f7f5a3b88e25d7ed6d968dd94769d8bd68c9d3c12849a13474304c4b9dd8d67c5e848814b2af7316efa4cbd0bb64e3d9b459484f09cf779c8039a728a09349f8948f329298520eb48cb33baa9be7f56367e862a7c4f566b8b6878be920f7feb0775f74df1b340f91f5206641737c7e471cb53154d8836bcdae4d09eb6da8d07262c3728c"}, {0xe8, 0x13f, 0x8, "562ea0009f67eb1f9ed46e5b5695cae8b4306f801aee385b9a49f8b184dc8c857ed3614e3d075299e9a05670ba46fc653b011cc92b791a2b4824c7b0748b1361f86660551a239ee77f19fbda436b7f515423162a3112c51795a38de0702f7e39037de7b82057a4b6555094d164d9917fba54283c68671f1f8f259620689870663bb9d80a0fccfa6d95921b309ab4e531e155184dc5b23cd52ccc708c45d5b7112f7ff7afc78aa3cf6b4c09be09621a625c93b708319c699ff86d8df3fbf3f61128303ca7aae58e3abab14adc7940967fc7cbd9d17eca3e"}, {0xb8, 0x1ff, 0x2, "23adddf42744d8aa3c8b392e3f774e96570537f8c8f7d0c9a67b95d35995e1f65249a8154534e02567f6381ce629362d8ee4dabbe5808f1e0f6e8cce977c8a2668a50dacdf9865ef67e941f51aad0f5a309f4e78e952c991e9131bd775ea5af220a5e42e5a51c4c1509d80c3dca8d94c8f402542b475b74446f20c94081d15d2776e121cf4b12bbccfa4192e1ad74b8770b0524033fe4d0bb6824718d5833ebf481543fdbf"}, {0xe0, 0x115, 0x8, "fd602f1d1797a83625503ac1bf2284ca2d5f071acd06d32d87f926628fa892756756bb2e3812d8f4829ff7518fdf37c4c5d2a2fef5f1c9f2eaf096afa04d0729154072688124890845431457a8106d0d45ae17891cd30a7cc1d82931b408653a938e70f46942d801f931f38c9509a6dcf7883d7fa6cb41c18c60fb3914e8e10e229532fce58f0aa89bc8880fbb2d829ee0beb87705d1b996f7ef92ee8ac0de2971aa8da919892b27b51a20bbc1c461e75b5c631b0df7495bb58d04767b58d88170fa5f36dbc4156115"}, {0xa8, 0x10f, 0x10001, "9d0a0a822cfa237c14220b4e2e12b70bcd788eb7424d787b7d57de9d215950a8b0ee444a70f28464e201fd58ea903a0bae342ba21d857670e419ed9b48af361271eba1a5a18ee4d54cb6ddf3779dbd5be6435c063329df7760b3cd0b0c107ecce33ccd141eb1a5b71ba02ce4f131248b11328b5b57d268785717f60fae08fb9c5523bd2a74f6adc15e32bf818343568c604f51"}], 0x490, 0x44000}, 0x44) 2018/03/30 21:36:42 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x1, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, &(0x7f0000000200)) socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) r3 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x7fff, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x0, 0x8, 0x1, 0x10000, 0x0, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x0, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r2, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000006c0)={&(0x7f0000000680)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r2}, 0x10) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000a80)) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0xa11800, &(0x7f0000000240)) socketpair(0x5, 0x5, 0x2, &(0x7f0000000200)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x37002, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6") gettid() close(0xffffffffffffffff) [ 953.734470] FAULT_INJECTION: forcing a failure. [ 953.734470] name failslab, interval 1, probability 0, space 0, times 0 [ 953.746000] CPU: 1 PID: 15293 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 953.753283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.762634] Call Trace: [ 953.765222] dump_stack+0x194/0x24d [ 953.768845] ? arch_local_irq_restore+0x53/0x53 [ 953.773511] ? find_held_lock+0x35/0x1d0 [ 953.777574] should_fail+0x8c0/0xa40 [ 953.781285] ? __list_lru_init+0x352/0x750 [ 953.785525] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 953.790628] ? trace_hardirqs_off+0x10/0x10 [ 953.794944] ? find_first_zero_bit+0x93/0xe0 [ 953.799349] ? trace_hardirqs_off+0x10/0x10 [ 953.803670] ? find_held_lock+0x35/0x1d0 [ 953.807732] ? __lock_is_held+0xb6/0x140 [ 953.811794] ? check_same_owner+0x320/0x320 [ 953.816097] ? lock_downgrade+0x980/0x980 [ 953.820228] ? rcu_note_context_switch+0x710/0x710 [ 953.825140] ? find_held_lock+0x35/0x1d0 [ 953.829190] should_failslab+0xec/0x120 [ 953.833159] __kmalloc+0x63/0x760 [ 953.836601] ? lock_downgrade+0x980/0x980 [ 953.840742] ? register_shrinker+0x10e/0x2d0 [ 953.845134] ? trace_event_raw_event_module_request+0x320/0x320 [ 953.851180] register_shrinker+0x10e/0x2d0 [ 953.855398] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 953.861174] ? memcpy+0x45/0x50 [ 953.864436] sget_userns+0xbbf/0xe40 [ 953.868126] ? set_anon_super+0x20/0x20 [ 953.872084] ? put_filp+0x90/0x90 [ 953.875528] ? destroy_unused_super.part.6+0xd0/0xd0 [ 953.880616] ? mnt_free_id.isra.21+0x50/0x50 [ 953.885001] ? trace_hardirqs_off+0x10/0x10 [ 953.889308] ? putname+0xee/0x130 [ 953.892737] ? cap_capable+0x1b5/0x230 [ 953.896613] ? security_capable+0x8e/0xc0 [ 953.900744] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 953.905912] ? ns_capable_common+0xcf/0x160 [ 953.910211] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 953.915384] mount_ns+0x6d/0x190 [ 953.918725] rpc_mount+0x9e/0xd0 [ 953.922068] mount_fs+0x66/0x2d0 [ 953.925415] vfs_kern_mount.part.26+0xc6/0x4a0 [ 953.929971] ? may_umount+0xa0/0xa0 [ 953.933573] ? _raw_read_unlock+0x22/0x30 [ 953.937705] ? __get_fs_type+0x8a/0xc0 [ 953.941571] do_mount+0xea4/0x2bb0 [ 953.945085] ? __might_fault+0x110/0x1d0 [ 953.949136] ? copy_mount_string+0x40/0x40 [ 953.953351] ? check_same_owner+0x320/0x320 [ 953.957646] ? __check_object_size+0x8b/0x530 [ 953.962115] ? __might_sleep+0x95/0x190 [ 953.966066] ? kasan_check_write+0x14/0x20 [ 953.970272] ? _copy_from_user+0x99/0x110 [ 953.974391] ? memdup_user+0x5e/0x90 [ 953.978080] ? copy_mount_options+0x1f7/0x2e0 [ 953.982549] SyS_mount+0xab/0x120 [ 953.985981] ? copy_mnt_ns+0xb30/0xb30 [ 953.989842] do_syscall_64+0x281/0x940 [ 953.993706] ? vmalloc_sync_all+0x30/0x30 [ 953.997838] ? _raw_spin_unlock_irq+0x27/0x70 [ 954.002315] ? finish_task_switch+0x1c1/0x7e0 [ 954.006786] ? syscall_return_slowpath+0x550/0x550 [ 954.011688] ? syscall_return_slowpath+0x2ac/0x550 [ 954.016594] ? prepare_exit_to_usermode+0x350/0x350 [ 954.021583] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 954.026920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 954.031737] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 954.036900] RIP: 0033:0x454e79 [ 954.040061] RSP: 002b:00007f4b6bbd1c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 954.047744] RAX: ffffffffffffffda RBX: 00007f4b6bbd26d4 RCX: 0000000000454e79 [ 954.054987] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 954.062237] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 954.069488] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000015 [ 954.076731] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000037 [ 954.157566] ------------[ cut here ]------------ [ 954.162495] refcount_t: increment on 0; use-after-free. [ 954.168109] WARNING: CPU: 1 PID: 24293 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 954.175899] Kernel panic - not syncing: panic_on_warn set ... [ 954.175899] [ 954.183247] CPU: 1 PID: 24293 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 954.190498] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 954.199822] Call Trace: [ 954.202384] dump_stack+0x194/0x24d [ 954.205986] ? arch_local_irq_restore+0x53/0x53 [ 954.210629] ? vsnprintf+0x1ed/0x1900 [ 954.214461] panic+0x1e4/0x41c [ 954.217634] ? refcount_error_report+0x214/0x214 [ 954.222370] ? show_regs_print_info+0x18/0x18 [ 954.226839] ? __warn+0x1c1/0x200 [ 954.230267] ? refcount_inc+0x47/0x50 [ 954.234044] __warn+0x1dc/0x200 [ 954.237311] ? refcount_inc+0x47/0x50 [ 954.241094] report_bug+0x1f4/0x2b0 [ 954.244736] fixup_bug.part.10+0x37/0x80 [ 954.248771] do_error_trap+0x2d7/0x3e0 [ 954.252636] ? vprintk_default+0x28/0x30 [ 954.256679] ? math_error+0x400/0x400 [ 954.260451] ? printk+0xaa/0xca [ 954.263703] ? show_regs_print_info+0x18/0x18 [ 954.268173] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 954.272987] do_invalid_op+0x1b/0x20 [ 954.276716] invalid_op+0x1b/0x40 [ 954.280142] RIP: 0010:refcount_inc+0x47/0x50 [ 954.284519] RSP: 0018:ffff8801a3a47860 EFLAGS: 00010286 [ 954.289855] RAX: dffffc0000000008 RBX: ffff8801d32c8044 RCX: ffffffff815b421e [ 954.297097] RDX: 0000000000000000 RSI: 1ffff10034748ebc RDI: 1ffff10034748e91 [ 954.304338] RBP: ffff8801a3a47868 R08: 0000000000000000 R09: 0000000000000000 [ 954.311583] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801a3a47af8 [ 954.318824] R13: ffff8801aea68013 R14: ffff8801d32c8040 R15: ffff8801aea68001 [ 954.326077] ? vprintk_func+0x5e/0xc0 [ 954.329854] sk_alloc+0x3f9/0x1440 [ 954.333372] ? sock_def_error_report+0x5e0/0x5e0 [ 954.338103] ? __raw_spin_lock_init+0x2d/0x100 [ 954.342656] ? trace_hardirqs_off+0x10/0x10 [ 954.346962] ? do_raw_write_unlock+0x290/0x290 [ 954.351517] ? trace_hardirqs_off+0x10/0x10 [ 954.355810] ? __raw_spin_lock_init+0x1c/0x100 [ 954.360363] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 954.365358] ? find_held_lock+0x35/0x1d0 [ 954.369418] ? inet_create+0x3fc/0xf50 [ 954.373277] ? lock_downgrade+0x980/0x980 [ 954.377397] ? lock_release+0xa40/0xa40 [ 954.381349] ? lock_downgrade+0x980/0x980 [ 954.385481] inet_create+0x47c/0xf50 [ 954.389170] ? ipip_gro_receive+0xf0/0xf0 [ 954.393293] ? __lock_is_held+0xb6/0x140 [ 954.397342] __sock_create+0x4d4/0x850 [ 954.401202] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 954.406108] ? user_path_create+0x40/0x40 [ 954.410230] SyS_socket+0xeb/0x1d0 [ 954.413744] ? fillonedir+0x250/0x250 [ 954.417514] ? move_addr_to_kernel+0x60/0x60 [ 954.422120] ? do_syscall_64+0xb7/0x940 [ 954.426076] ? move_addr_to_kernel+0x60/0x60 [ 954.430463] do_syscall_64+0x281/0x940 [ 954.434322] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 954.439828] ? syscall_return_slowpath+0x550/0x550 [ 954.444730] ? syscall_return_slowpath+0x2ac/0x550 [ 954.449632] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 954.454969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 954.459785] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 954.464947] RIP: 0033:0x4579a7 [ 954.468107] RSP: 002b:00007fff646f0d78 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 954.475784] RAX: ffffffffffffffda RBX: 000000000000025b RCX: 00000000004579a7 [ 954.483032] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 954.490280] RBP: 00000000000e8f0d R08: 0000000000000000 R09: 0000000000000001 [ 954.497520] R10: 000000000000000a R11: 0000000000000202 R12: 00000000000005f5 [ 954.504761] R13: 0000000000000019 R14: 00000000000005f5 R15: 00000000000e8d55 [ 954.512565] Dumping ftrace buffer: [ 954.516157] (ftrace buffer empty) [ 954.519842] Kernel Offset: disabled [ 954.523439] Rebooting in 86400 seconds..