0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:15 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:15 executing program 0 (fault-call:15 fault-nth:14): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:15 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="85000000080100004500000000000000950000001000000010284d24"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000002c0)) 2018/03/30 19:03:15 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 278.310979] FAULT_INJECTION: forcing a failure. [ 278.310979] name failslab, interval 1, probability 0, space 0, times 0 [ 278.322492] CPU: 0 PID: 18318 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 278.329772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.339130] Call Trace: [ 278.341731] dump_stack+0x194/0x24d [ 278.345361] ? arch_local_irq_restore+0x53/0x53 [ 278.350041] ? __save_stack_trace+0x7e/0xd0 [ 278.354374] should_fail+0x8c0/0xa40 [ 278.358096] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 278.363199] ? kasan_kmalloc+0xad/0xe0 [ 278.367091] ? kmem_cache_alloc_trace+0x136/0x740 [ 278.371918] ? __memcg_init_list_lru_node+0x169/0x270 [ 278.377087] ? __list_lru_init+0x544/0x750 [ 278.381300] ? sget_userns+0x691/0xe40 [ 278.385171] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 278.389904] ? do_mount+0xea4/0x2bb0 [ 278.393594] ? SyS_mount+0xab/0x120 [ 278.397206] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.402556] ? find_held_lock+0x35/0x1d0 [ 278.406604] ? __lock_is_held+0xb6/0x140 [ 278.410671] ? check_same_owner+0x320/0x320 [ 278.414978] ? rcu_note_context_switch+0x710/0x710 [ 278.419894] should_failslab+0xec/0x120 [ 278.423851] kmem_cache_alloc_trace+0x4b/0x740 [ 278.428413] ? __kmalloc_node+0x33/0x70 [ 278.432371] ? __kmalloc_node+0x33/0x70 [ 278.436332] ? rcu_read_lock_sched_held+0x108/0x120 [ 278.441340] __memcg_init_list_lru_node+0x169/0x270 [ 278.446340] ? list_lru_add+0x7c0/0x7c0 [ 278.450307] ? __kmalloc_node+0x47/0x70 [ 278.454276] __list_lru_init+0x544/0x750 [ 278.458326] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 278.464193] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 278.469193] ? __lockdep_init_map+0xe4/0x650 [ 278.473585] ? lockdep_init_map+0x9/0x10 [ 278.477630] sget_userns+0x691/0xe40 [ 278.481336] ? set_anon_super+0x20/0x20 [ 278.485294] ? put_filp+0x90/0x90 [ 278.488731] ? destroy_unused_super.part.6+0xd0/0xd0 [ 278.493814] ? alloc_vfsmnt+0x762/0x9c0 [ 278.497769] ? path_lookupat+0x238/0xba0 [ 278.501905] ? mnt_free_id.isra.21+0x50/0x50 [ 278.506297] ? trace_hardirqs_off+0x10/0x10 [ 278.511042] ? putname+0xee/0x130 [ 278.514482] ? cap_capable+0x1b5/0x230 [ 278.518355] ? security_capable+0x8e/0xc0 [ 278.522502] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 278.527672] ? ns_capable_common+0xcf/0x160 [ 278.531976] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 278.537146] mount_ns+0x6d/0x190 [ 278.540495] rpc_mount+0x9e/0xd0 [ 278.543847] mount_fs+0x66/0x2d0 [ 278.547198] vfs_kern_mount.part.26+0xc6/0x4a0 [ 278.551760] ? may_umount+0xa0/0xa0 [ 278.555369] ? _raw_read_unlock+0x22/0x30 [ 278.559499] ? __get_fs_type+0x8a/0xc0 [ 278.563371] do_mount+0xea4/0x2bb0 [ 278.566891] ? __might_fault+0x110/0x1d0 [ 278.570935] ? copy_mount_string+0x40/0x40 [ 278.575152] ? __check_object_size+0x8b/0x530 [ 278.579631] ? __might_sleep+0x95/0x190 [ 278.583589] ? kasan_check_write+0x14/0x20 [ 278.587806] ? _copy_from_user+0x99/0x110 [ 278.591939] ? memdup_user+0x5e/0x90 [ 278.595633] ? copy_mount_options+0x1f7/0x2e0 [ 278.600111] SyS_mount+0xab/0x120 [ 278.603544] ? copy_mnt_ns+0xb30/0xb30 [ 278.607413] do_syscall_64+0x281/0x940 [ 278.611284] ? vmalloc_sync_all+0x30/0x30 [ 278.615419] ? _raw_spin_unlock_irq+0x27/0x70 [ 278.619894] ? finish_task_switch+0x1c1/0x7e0 [ 278.624375] ? syscall_return_slowpath+0x550/0x550 [ 278.629283] ? syscall_return_slowpath+0x2ac/0x550 [ 278.634197] ? prepare_exit_to_usermode+0x350/0x350 [ 278.639193] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 278.644556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 278.649384] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 278.654567] RIP: 0033:0x454e79 2018/03/30 19:03:15 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="8500000008000000450000000000400095109e6a00000000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) recvmsg(r1, &(0x7f0000000580)={&(0x7f0000000400)=@can={0x0, 0x0}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000340)=""/15, 0xf}, {&(0x7f0000000480)=""/63, 0x3f}], 0x2, &(0x7f0000000500)=""/67, 0x43, 0x9}, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f00000005c0)=@hci={0x1f, r5, 0x3}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000640)="2e26d738cf4f01ae211b38988bbb32c9e7fd071bc98a5c957d7f7d80e76b53a28e036d140ad79a08737a2818b2393fc7631d359121", 0x35}, {&(0x7f0000000680)="7539b8ed8b450250d6600ce4d8d765b81557315d72a14f819f41f324af7356f5071c25bd2a7aa5ebd670af1aa6d3a9b880b7566c3c73e5cb7583d965d8f2e44c0dc2d23ac40aa1dc3d394ea1a3051698ca651a8b8be34e3a906602384295011206278be0b7a8937b426b02cc11711b830efda3b4c8d25477533b01b78f6cec96", 0x80}, {&(0x7f0000000700)="156b01484c8299ef74464f787aadf037f8354b7281e3d7558fd8e37a8c4c3a9cf590c69a3d050e6097e9c2062357031d7612b2f8416364e191f858c83b241ec0a69dc18e3b4c89a8a7a67eeb6ee55403ce137f2ebb9d1e5ef2ec03", 0x5b}], 0x3, 0x0, 0x0, 0x880}, 0x40004) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) 2018/03/30 19:03:15 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) [ 278.657736] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.665427] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 278.672676] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 278.679925] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 278.687172] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 278.694422] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/30 19:03:15 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:15 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x0, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 4: r0 = gettid() socketpair(0x10, 0x7, 0x101, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000005c0)={0x7, 0x70, 0x7, 0x7, 0x8, 0x9, 0x0, 0xffffffffffffff88, 0x20, 0x4, 0x800, 0x5, 0x6, 0x5, 0x6, 0x1, 0x3f, 0x3, 0xde4, 0x3, 0x80000001, 0x2b, 0xb20, 0xf6c, 0x5, 0x1, 0x7, 0x4600099, 0xff, 0x8, 0x6d, 0x8, 0x5, 0x80, 0x10000, 0x7, 0x20, 0x8, 0x0, 0xe5c, 0x7, @perf_config_ext={0x2, 0x7}, 0x20, 0x1, 0x401, 0x2, 0x45, 0x9, 0x3}, r0, 0x8, r1, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x50, &(0x7f00000001c0)={0x0, 0x0}}, 0x10) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)=r2, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000029c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000002a00)={r3}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="852490908249763300450000000000000000000000000000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r1, 0x28, &(0x7f0000000680)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={r5, 0x20, 0x8}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xd, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000000009500000000000000"], &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0xe4, &(0x7f00000004c0)=""/228}, 0x48) r7 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='ntfs\x00', 0x2, &(0x7f0000000400)="ccf422ef01e2053d3f38bb37101abc418e54fa1fcd4306ac4abbd6473bd0460916080510488c69a6c02426c0b1e73408d7ae0b9631e3ba5e24278e09fa36e221bf8c437e88bc6adb0b9b71f9f13b1e1650f1c40155566db466c2dbec14eb46249ee18bc50ec60c9bd31a260adcafbc58e63201b8048bf4b0a8f61d05acfebc907ed63c4c08bfe5382866b72608b1893639e1f2134c05b215d6533ccb11203e752314180f925828c19747238146959f71181be26cb5") ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) 2018/03/30 19:03:16 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x0, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:16 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 2 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:16 executing program 0 (fault-call:15 fault-nth:15): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 279.390724] FAULT_INJECTION: forcing a failure. [ 279.390724] name failslab, interval 1, probability 0, space 0, times 0 [ 279.402073] CPU: 0 PID: 18365 Comm: syz-executor2 Not tainted 4.16.0-rc6+ #42 [ 279.409369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.418729] Call Trace: [ 279.421336] dump_stack+0x194/0x24d [ 279.424991] ? arch_local_irq_restore+0x53/0x53 [ 279.429677] ? __fget+0x342/0x5b0 [ 279.433165] should_fail+0x8c0/0xa40 2018/03/30 19:03:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00'}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x0, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:16 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x0, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 279.436895] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.442547] ? trace_hardirqs_off+0x10/0x10 [ 279.447153] ? find_held_lock+0x35/0x1d0 [ 279.451293] ? check_same_owner+0x320/0x320 [ 279.455639] ? rcu_note_context_switch+0x710/0x710 [ 279.460592] should_failslab+0xec/0x120 [ 279.464584] __kmalloc_track_caller+0x5f/0x760 [ 279.469181] ? __might_sleep+0x95/0x190 [ 279.473171] ? SyS_bpf+0x1fe2/0x4890 [ 279.476904] memdup_user+0x2c/0x90 [ 279.480462] SyS_bpf+0x1fe2/0x4890 [ 279.484025] ? bpf_prog_get+0x20/0x20 [ 279.487848] ? perf_trace_lock+0x900/0x900 [ 279.490154] FAULT_INJECTION: forcing a failure. [ 279.490154] name failslab, interval 1, probability 0, space 0, times 0 [ 279.492092] ? find_held_lock+0x35/0x1d0 [ 279.492119] ? trace_hardirqs_off+0x10/0x10 [ 279.492138] ? _parse_integer+0xe9/0x140 [ 279.515715] ? trace_hardirqs_off+0x10/0x10 [ 279.520035] ? _parse_integer+0x140/0x140 [ 279.524183] ? find_held_lock+0x35/0x1d0 [ 279.528238] ? trace_hardirqs_off+0x10/0x10 [ 279.532559] ? get_pid_task+0x93/0x140 [ 279.536438] ? lock_downgrade+0x980/0x980 [ 279.540587] ? find_held_lock+0x35/0x1d0 [ 279.544659] ? __f_unlock_pos+0x19/0x20 [ 279.548627] ? lock_downgrade+0x980/0x980 [ 279.552771] ? get_pid_task+0xbc/0x140 [ 279.556651] ? proc_fail_nth_write+0x9b/0x1d0 [ 279.561139] ? map_files_get_link+0x3a0/0x3a0 [ 279.565628] ? handle_mm_fault+0x35b/0xb10 [ 279.569861] ? find_held_lock+0x35/0x1d0 [ 279.573922] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 279.578754] ? vfs_write+0x374/0x510 [ 279.582459] ? wait_for_completion+0x770/0x770 [ 279.587039] ? __lock_is_held+0xb6/0x140 [ 279.591111] ? __sb_end_write+0xa0/0xd0 [ 279.595084] ? fput+0xd2/0x140 [ 279.598281] ? SyS_write+0x184/0x220 [ 279.602000] ? do_syscall_64+0xb7/0x940 [ 279.605971] ? bpf_prog_get+0x20/0x20 [ 279.609770] do_syscall_64+0x281/0x940 [ 279.613648] ? vmalloc_sync_all+0x30/0x30 [ 279.617794] ? _raw_spin_unlock_irq+0x27/0x70 [ 279.622280] ? finish_task_switch+0x1c1/0x7e0 [ 279.626768] ? syscall_return_slowpath+0x550/0x550 [ 279.631691] ? syscall_return_slowpath+0x2ac/0x550 [ 279.636700] ? prepare_exit_to_usermode+0x350/0x350 [ 279.641805] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 279.647168] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.652011] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.657190] RIP: 0033:0x454e79 [ 279.660382] RSP: 002b:00007f0239e75c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 279.668084] RAX: ffffffffffffffda RBX: 00007f0239e766d4 RCX: 0000000000454e79 [ 279.675343] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000003 [ 279.682603] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 279.689864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000015 [ 279.697141] R13: 000000000000003d R14: 00000000006f2658 R15: 0000000000000000 [ 279.704430] CPU: 1 PID: 18364 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 279.711718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.721072] Call Trace: [ 279.723664] dump_stack+0x194/0x24d [ 279.727298] ? arch_local_irq_restore+0x53/0x53 [ 279.731969] ? __save_stack_trace+0x7e/0xd0 [ 279.736300] should_fail+0x8c0/0xa40 [ 279.740024] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 279.745138] ? kasan_kmalloc+0xad/0xe0 [ 279.749032] ? kmem_cache_alloc_trace+0x136/0x740 [ 279.753877] ? __memcg_init_list_lru_node+0x169/0x270 [ 279.759069] ? __list_lru_init+0x544/0x750 [ 279.763308] ? sget_userns+0x691/0xe40 [ 279.767199] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 279.771962] ? do_mount+0xea4/0x2bb0 [ 279.775678] ? SyS_mount+0xab/0x120 [ 279.779317] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.784693] ? find_held_lock+0x35/0x1d0 [ 279.788766] ? __lock_is_held+0xb6/0x140 [ 279.792838] ? check_same_owner+0x320/0x320 [ 279.797163] ? rcu_note_context_switch+0x710/0x710 [ 279.802094] should_failslab+0xec/0x120 [ 279.806069] kmem_cache_alloc_trace+0x4b/0x740 [ 279.810649] ? __kmalloc_node+0x33/0x70 [ 279.814622] ? __kmalloc_node+0x33/0x70 [ 279.818596] ? rcu_read_lock_sched_held+0x108/0x120 [ 279.823617] __memcg_init_list_lru_node+0x169/0x270 [ 279.828637] ? list_lru_add+0x7c0/0x7c0 [ 279.832597] ? __kmalloc_node+0x47/0x70 [ 279.836559] __list_lru_init+0x544/0x750 [ 279.840605] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 279.846471] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 279.851469] ? __lockdep_init_map+0xe4/0x650 [ 279.855862] ? lockdep_init_map+0x9/0x10 [ 279.859907] sget_userns+0x691/0xe40 [ 279.863599] ? set_anon_super+0x20/0x20 [ 279.867556] ? put_filp+0x90/0x90 [ 279.870988] ? destroy_unused_super.part.6+0xd0/0xd0 [ 279.876073] ? alloc_vfsmnt+0x762/0x9c0 [ 279.880032] ? path_lookupat+0x238/0xba0 [ 279.884073] ? mnt_free_id.isra.21+0x50/0x50 [ 279.888465] ? trace_hardirqs_off+0x10/0x10 [ 279.892775] ? mark_held_locks+0xaf/0x100 [ 279.896904] ? cap_capable+0x1b5/0x230 [ 279.900774] ? security_capable+0x8e/0xc0 [ 279.904914] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 279.910088] ? ns_capable_common+0xcf/0x160 [ 279.914393] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 279.919561] mount_ns+0x6d/0x190 [ 279.922911] rpc_mount+0x9e/0xd0 [ 279.926259] mount_fs+0x66/0x2d0 [ 279.929608] vfs_kern_mount.part.26+0xc6/0x4a0 [ 279.934175] ? may_umount+0xa0/0xa0 [ 279.937785] ? _raw_read_unlock+0x22/0x30 [ 279.941911] ? __get_fs_type+0x8a/0xc0 [ 279.945782] do_mount+0xea4/0x2bb0 [ 279.949301] ? __might_fault+0x110/0x1d0 [ 279.953347] ? copy_mount_string+0x40/0x40 [ 279.957561] ? __check_object_size+0x8b/0x530 [ 279.962047] ? __might_sleep+0x95/0x190 [ 279.966017] ? kasan_check_write+0x14/0x20 [ 279.970236] ? _copy_from_user+0x99/0x110 [ 279.974369] ? memdup_user+0x5e/0x90 [ 279.978061] ? copy_mount_options+0x1f7/0x2e0 [ 279.982542] SyS_mount+0xab/0x120 [ 279.985975] ? copy_mnt_ns+0xb30/0xb30 [ 279.989845] do_syscall_64+0x281/0x940 [ 279.993714] ? vmalloc_sync_all+0x30/0x30 [ 279.997840] ? _raw_spin_unlock_irq+0x27/0x70 [ 280.002316] ? finish_task_switch+0x1c1/0x7e0 [ 280.006792] ? syscall_return_slowpath+0x550/0x550 [ 280.011705] ? syscall_return_slowpath+0x2ac/0x550 [ 280.016614] ? prepare_exit_to_usermode+0x350/0x350 [ 280.021611] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 280.026960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.031789] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.036958] RIP: 0033:0x454e79 2018/03/30 19:03:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:16 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000300)={0xffffffff, 0xffffffffffffffff, 0x18}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)={&(0x7f00000002c0)='./file0\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000f68000006a0a00fffffff600611880"], &(0x7f0000000000)="47504c00bc3047eb525f484f89fc96dd6ca64da40ff023122e66f6", 0x0, 0xce, &(0x7f0000000180)=""/206}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0x5, &(0x7f0000000040)=@framed={{0x18}, [@jmp={0x5}], {0x95}}, &(0x7f0000000200)='syzkaller\x00', 0x80000001, 0x228, &(0x7f0000000300)=""/187}, 0x48) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x344, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) [ 280.040128] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.047818] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 280.055069] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 280.062318] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 280.069567] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 280.076819] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f 2018/03/30 19:03:17 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0x0, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:17 executing program 2 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:17 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x0, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:17 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:17 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:17 executing program 0 (fault-call:15 fault-nth:16): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:17 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:17 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000000800000045003500000000000095000000000000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/03/30 19:03:17 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x0, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:17 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 280.616623] FAULT_INJECTION: forcing a failure. [ 280.616623] name failslab, interval 1, probability 0, space 0, times 0 [ 280.627954] CPU: 0 PID: 18405 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 280.635228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.644581] Call Trace: [ 280.647171] dump_stack+0x194/0x24d [ 280.650804] ? arch_local_irq_restore+0x53/0x53 [ 280.655470] ? __save_stack_trace+0x7e/0xd0 [ 280.659798] should_fail+0x8c0/0xa40 2018/03/30 19:03:17 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 280.663520] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 280.668625] ? kasan_kmalloc+0xad/0xe0 [ 280.672514] ? kmem_cache_alloc_trace+0x136/0x740 [ 280.677446] ? __memcg_init_list_lru_node+0x169/0x270 [ 280.682641] ? __list_lru_init+0x544/0x750 [ 280.686879] ? sget_userns+0x691/0xe40 [ 280.690765] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 280.695517] ? do_mount+0xea4/0x2bb0 [ 280.699228] ? SyS_mount+0xab/0x120 [ 280.702850] ? do_syscall_64+0x281/0x940 [ 280.706911] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.712897] ? find_held_lock+0x35/0x1d0 2018/03/30 19:03:17 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0x0, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:17 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 280.716963] ? __lock_is_held+0xb6/0x140 [ 280.721031] ? check_same_owner+0x320/0x320 [ 280.725353] ? rcu_note_context_switch+0x710/0x710 [ 280.730288] should_failslab+0xec/0x120 [ 280.734269] kmem_cache_alloc_trace+0x4b/0x740 [ 280.738851] ? __kmalloc_node+0x33/0x70 [ 280.742827] ? __kmalloc_node+0x33/0x70 [ 280.746800] ? rcu_read_lock_sched_held+0x108/0x120 [ 280.751819] __memcg_init_list_lru_node+0x169/0x270 [ 280.756837] ? list_lru_add+0x7c0/0x7c0 [ 280.760813] ? __kmalloc_node+0x47/0x70 [ 280.764793] __list_lru_init+0x544/0x750 [ 280.768856] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 280.774741] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 280.779751] ? __lockdep_init_map+0xe4/0x650 [ 280.784164] ? lockdep_init_map+0x9/0x10 [ 280.788230] sget_userns+0x691/0xe40 [ 280.791946] ? set_anon_super+0x20/0x20 [ 280.795919] ? put_filp+0x90/0x90 [ 280.799365] ? destroy_unused_super.part.6+0xd0/0xd0 [ 280.804464] ? alloc_vfsmnt+0x762/0x9c0 [ 280.808433] ? path_lookupat+0x238/0xba0 [ 280.812584] ? mnt_free_id.isra.21+0x50/0x50 [ 280.816991] ? trace_hardirqs_off+0x10/0x10 [ 280.821311] ? putname+0xee/0x130 [ 280.824760] ? cap_capable+0x1b5/0x230 [ 280.828644] ? security_capable+0x8e/0xc0 [ 280.832792] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 280.837977] ? ns_capable_common+0xcf/0x160 [ 280.842296] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 280.847477] mount_ns+0x6d/0x190 [ 280.850833] rpc_mount+0x9e/0xd0 [ 280.854184] mount_fs+0x66/0x2d0 [ 280.857534] vfs_kern_mount.part.26+0xc6/0x4a0 [ 280.862100] ? may_umount+0xa0/0xa0 [ 280.865715] ? _raw_read_unlock+0x22/0x30 [ 280.869934] ? __get_fs_type+0x8a/0xc0 [ 280.873805] do_mount+0xea4/0x2bb0 [ 280.877324] ? __might_fault+0x110/0x1d0 [ 280.881368] ? copy_mount_string+0x40/0x40 [ 280.885580] ? check_same_owner+0x320/0x320 [ 280.889884] ? __check_object_size+0x8b/0x530 [ 280.894363] ? __might_sleep+0x95/0x190 [ 280.898325] ? kasan_check_write+0x14/0x20 [ 280.902539] ? _copy_from_user+0x99/0x110 [ 280.906669] ? memdup_user+0x5e/0x90 [ 280.910360] ? copy_mount_options+0x1f7/0x2e0 [ 280.914841] SyS_mount+0xab/0x120 [ 280.918280] ? copy_mnt_ns+0xb30/0xb30 [ 280.922147] do_syscall_64+0x281/0x940 [ 280.926014] ? vmalloc_sync_all+0x30/0x30 [ 280.930144] ? _raw_spin_unlock_irq+0x27/0x70 [ 280.934620] ? finish_task_switch+0x1c1/0x7e0 [ 280.939097] ? syscall_return_slowpath+0x550/0x550 [ 280.944014] ? syscall_return_slowpath+0x2ac/0x550 [ 280.948925] ? prepare_exit_to_usermode+0x350/0x350 [ 280.953919] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 280.959263] ? trace_hardirqs_off_thunk+0x1a/0x1c 2018/03/30 19:03:17 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 280.964089] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.969344] RIP: 0033:0x454e79 [ 280.972513] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.980200] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 280.987451] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 280.994699] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 281.001947] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 281.009197] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 2018/03/30 19:03:18 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0x0, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:18 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000400)) 2018/03/30 19:03:18 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0x0, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 0 (fault-call:15 fault-nth:17): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:18 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:18 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 281.515654] FAULT_INJECTION: forcing a failure. [ 281.515654] name failslab, interval 1, probability 0, space 0, times 0 [ 281.527066] CPU: 1 PID: 18454 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 281.534354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.544803] Call Trace: [ 281.547398] dump_stack+0x194/0x24d [ 281.551037] ? arch_local_irq_restore+0x53/0x53 [ 281.555709] ? __save_stack_trace+0x7e/0xd0 [ 281.560032] should_fail+0x8c0/0xa40 [ 281.563734] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 281.568821] ? kasan_kmalloc+0xad/0xe0 [ 281.572689] ? kmem_cache_alloc_trace+0x136/0x740 [ 281.577514] ? __memcg_init_list_lru_node+0x169/0x270 [ 281.582680] ? __list_lru_init+0x544/0x750 [ 281.586894] ? sget_userns+0x691/0xe40 [ 281.590764] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 281.595498] ? do_mount+0xea4/0x2bb0 [ 281.599190] ? SyS_mount+0xab/0x120 [ 281.602801] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.608157] ? find_held_lock+0x35/0x1d0 [ 281.612206] ? __lock_is_held+0xb6/0x140 [ 281.616259] ? check_same_owner+0x320/0x320 [ 281.620570] ? rcu_note_context_switch+0x710/0x710 [ 281.625488] should_failslab+0xec/0x120 [ 281.629447] kmem_cache_alloc_trace+0x4b/0x740 [ 281.634015] ? __kmalloc_node+0x33/0x70 [ 281.637975] ? __kmalloc_node+0x33/0x70 [ 281.641936] ? rcu_read_lock_sched_held+0x108/0x120 [ 281.646939] __memcg_init_list_lru_node+0x169/0x270 [ 281.651943] ? list_lru_add+0x7c0/0x7c0 [ 281.655903] ? __kmalloc_node+0x47/0x70 [ 281.659867] __list_lru_init+0x544/0x750 [ 281.663916] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 281.669786] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 281.674787] ? __lockdep_init_map+0xe4/0x650 [ 281.679180] ? lockdep_init_map+0x9/0x10 [ 281.683225] sget_userns+0x691/0xe40 [ 281.686920] ? set_anon_super+0x20/0x20 [ 281.690877] ? put_filp+0x90/0x90 [ 281.694314] ? destroy_unused_super.part.6+0xd0/0xd0 [ 281.699482] ? alloc_vfsmnt+0x762/0x9c0 [ 281.703437] ? path_lookupat+0x238/0xba0 [ 281.707481] ? mnt_free_id.isra.21+0x50/0x50 [ 281.711875] ? trace_hardirqs_off+0x10/0x10 [ 281.716181] ? putname+0xee/0x130 [ 281.719622] ? cap_capable+0x1b5/0x230 [ 281.723497] ? security_capable+0x8e/0xc0 [ 281.727642] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 281.732812] ? ns_capable_common+0xcf/0x160 [ 281.737116] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 281.742285] mount_ns+0x6d/0x190 [ 281.745726] rpc_mount+0x9e/0xd0 [ 281.749075] mount_fs+0x66/0x2d0 [ 281.752427] vfs_kern_mount.part.26+0xc6/0x4a0 [ 281.756991] ? may_umount+0xa0/0xa0 [ 281.760601] ? _raw_read_unlock+0x22/0x30 [ 281.764729] ? __get_fs_type+0x8a/0xc0 [ 281.768603] do_mount+0xea4/0x2bb0 [ 281.772123] ? __might_fault+0x110/0x1d0 [ 281.776168] ? copy_mount_string+0x40/0x40 [ 281.780387] ? __check_object_size+0x8b/0x530 [ 281.784867] ? __might_sleep+0x95/0x190 [ 281.788829] ? kasan_check_write+0x14/0x20 [ 281.793051] ? _copy_from_user+0x99/0x110 [ 281.797184] ? memdup_user+0x5e/0x90 [ 281.800880] ? copy_mount_options+0x1f7/0x2e0 [ 281.805359] SyS_mount+0xab/0x120 [ 281.808795] ? copy_mnt_ns+0xb30/0xb30 [ 281.812667] do_syscall_64+0x281/0x940 [ 281.816536] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 281.822071] ? syscall_return_slowpath+0x550/0x550 [ 281.826982] ? syscall_return_slowpath+0x2ac/0x550 [ 281.831897] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 281.837244] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.842074] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.847245] RIP: 0033:0x454e79 [ 281.850434] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.858126] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 2018/03/30 19:03:18 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0x0, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:18 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0x0, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 4: socketpair$inet(0x2, 0x0, 0xd88, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000008000000450000000000000095c0273865eee000000000000000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0x4, 0x8}, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x200000000000012f, &(0x7f0000000300)=@raw=[@alu={0x4, 0x9, 0x7, 0xf, 0x2, 0x1c, 0x9}, @jmp={0x5, 0x2, 0xb, 0xf, 0x4, 0x41}, @call={0x85, 0x0, 0x0, 0xb}, @exit={0x95}, @map={0x18, 0x5, 0x1, 0x0, r0}], &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x1}, 0x48) r2 = perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x5, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x7, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0xb90e, 0x1ff, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x0, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) [ 281.865377] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 281.872628] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 281.879878] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 281.887130] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 2018/03/30 19:03:18 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r6, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000008300), 0x4) 2018/03/30 19:03:18 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x10, 0x1ff, 0xffff}], 0xe0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:18 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="850000000800000045000000000000000000003049a12446062b343ca349c6ee011bb8710348ddfda860e9249396027fdbe69e46735559d3894ff8a60a8109f8db85d9bef573635e2ffcce23f3172a54b0e629b098ef9971aa182d46537d7283f3f2a23c472730f2fb87832ebf0f35de4956d26c9943e5cc1dbcb1a96d27dd55c5d218257689b347cbeb4e55b08000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000002c0)) 2018/03/30 19:03:18 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x10, 0x1ff, 0xffff}], 0xe0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:18 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000800000045000000000000009500200000000000ff2d8afa43981d601eb33587a8e492f0a5b9b6c865c2895fe8ca5befe77332772c3c26acb2583db4389350a5"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/03/30 19:03:19 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:19 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r6, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000008300), 0x4) 2018/03/30 19:03:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0x1000, 0x14, &(0x7f0000000400)="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", &(0x7f00000002c0)=""/20, 0x5, 0x401}, 0x28) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001440)=0x1, 0xfffffffffffffd37) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) 2018/03/30 19:03:19 executing program 0 (fault-call:15 fault-nth:18): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:19 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x2, 0x0, [0x0, 0x0]}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x9, 0x0, 0xffffffff938f195a, 0x2, 0x18, r1, 0x9}, 0x2c) 2018/03/30 19:03:19 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x10, 0x1ff, 0xffff}], 0xe0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:19 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:19 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x10, 0x1ff, 0xffff}], 0xe0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:19 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r6, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000008300), 0x4) 2018/03/30 19:03:19 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x10, 0x1ff, 0xffff}], 0xe0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:19 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 282.572775] FAULT_INJECTION: forcing a failure. [ 282.572775] name failslab, interval 1, probability 0, space 0, times 0 [ 282.584209] CPU: 0 PID: 18520 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 282.592016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.601375] Call Trace: [ 282.603986] dump_stack+0x194/0x24d [ 282.607630] ? arch_local_irq_restore+0x53/0x53 [ 282.612311] ? __save_stack_trace+0x7e/0xd0 [ 282.616648] should_fail+0x8c0/0xa40 [ 282.620376] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 282.625491] ? kasan_kmalloc+0xad/0xe0 [ 282.629386] ? kmem_cache_alloc_trace+0x136/0x740 [ 282.634230] ? __memcg_init_list_lru_node+0x169/0x270 [ 282.639428] ? __list_lru_init+0x544/0x750 [ 282.643759] ? sget_userns+0x691/0xe40 [ 282.647655] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 282.652414] ? do_mount+0xea4/0x2bb0 [ 282.656132] ? SyS_mount+0xab/0x120 [ 282.659773] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.665151] ? find_held_lock+0x35/0x1d0 [ 282.669355] ? __lock_is_held+0xb6/0x140 2018/03/30 19:03:19 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 282.673436] ? check_same_owner+0x320/0x320 [ 282.677765] ? rcu_note_context_switch+0x710/0x710 [ 282.682707] should_failslab+0xec/0x120 [ 282.686689] kmem_cache_alloc_trace+0x4b/0x740 [ 282.691285] ? __kmalloc_node+0x33/0x70 [ 282.695270] ? __kmalloc_node+0x33/0x70 [ 282.699251] ? rcu_read_lock_sched_held+0x108/0x120 [ 282.704284] __memcg_init_list_lru_node+0x169/0x270 [ 282.710159] ? list_lru_add+0x7c0/0x7c0 [ 282.714141] ? __kmalloc_node+0x47/0x70 [ 282.718144] __list_lru_init+0x544/0x750 [ 282.722215] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 282.728113] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 282.733139] ? __lockdep_init_map+0xe4/0x650 [ 282.737553] ? lockdep_init_map+0x9/0x10 [ 282.741623] sget_userns+0x691/0xe40 [ 282.745336] ? set_anon_super+0x20/0x20 [ 282.749317] ? put_filp+0x90/0x90 [ 282.752791] ? destroy_unused_super.part.6+0xd0/0xd0 [ 282.757887] ? alloc_vfsmnt+0x762/0x9c0 [ 282.761860] ? path_lookupat+0x238/0xba0 [ 282.765923] ? mnt_free_id.isra.21+0x50/0x50 [ 282.770342] ? trace_hardirqs_off+0x10/0x10 [ 282.774667] ? putname+0xee/0x130 [ 282.778117] ? cap_capable+0x1b5/0x230 [ 282.781995] ? security_capable+0x8e/0xc0 [ 282.786134] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 282.791305] ? ns_capable_common+0xcf/0x160 [ 282.795611] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 282.800781] mount_ns+0x6d/0x190 [ 282.804132] rpc_mount+0x9e/0xd0 [ 282.807482] mount_fs+0x66/0x2d0 [ 282.810833] vfs_kern_mount.part.26+0xc6/0x4a0 [ 282.815395] ? may_umount+0xa0/0xa0 [ 282.819018] ? _raw_read_unlock+0x22/0x30 [ 282.823159] ? __get_fs_type+0x8a/0xc0 [ 282.827037] do_mount+0xea4/0x2bb0 [ 282.830561] ? __might_fault+0x110/0x1d0 [ 282.834608] ? copy_mount_string+0x40/0x40 [ 282.838829] ? __check_object_size+0x8b/0x530 [ 282.843311] ? __might_sleep+0x95/0x190 [ 282.847277] ? kasan_check_write+0x14/0x20 [ 282.851496] ? _copy_from_user+0x99/0x110 [ 282.855628] ? memdup_user+0x5e/0x90 [ 282.859319] ? copy_mount_options+0x1f7/0x2e0 [ 282.863796] SyS_mount+0xab/0x120 [ 282.867578] ? copy_mnt_ns+0xb30/0xb30 [ 282.871450] do_syscall_64+0x281/0x940 [ 282.875316] ? vmalloc_sync_all+0x30/0x30 [ 282.879444] ? _raw_spin_unlock_irq+0x27/0x70 [ 282.883920] ? finish_task_switch+0x1c1/0x7e0 [ 282.888396] ? syscall_return_slowpath+0x550/0x550 [ 282.893318] ? syscall_return_slowpath+0x2ac/0x550 [ 282.898239] ? prepare_exit_to_usermode+0x350/0x350 [ 282.903244] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 282.908592] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.913420] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.918590] RIP: 0033:0x454e79 [ 282.921758] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.929447] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 282.936696] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 282.943945] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 282.951201] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 282.958453] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/30 19:03:20 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x88, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ec"}], 0x158, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:20 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x10, 0x1ff, 0xffff}], 0xe0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:20 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:20 executing program 4: recvmsg(0xffffffffffffff9c, &(0x7f0000006580)={&(0x7f00000053c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000005540)=[{&(0x7f0000005440)=""/187, 0xbb}, {&(0x7f0000005500)=""/44, 0x2c}], 0x2, &(0x7f0000005580)=""/4096, 0x1000, 0x8}, 0x2163) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x200000000000043e, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x10000002, 0x1e8, &(0x7f0000000000)=""/153, 0x0, 0x0, [], r0}, 0x48) r1 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x3, 0x2, 0x0, 0x7, 0x1, 0x4, 0x1f, 0x6, 0x8, 0x7, 0x7fff, 0xc0ed, 0x100000000, 0x6, 0x400, 0xfffffffffffffffe, 0x800, 0x5d6e, 0x3, 0x1f, 0x7fff, 0x2, 0x7, 0x1ff, 0x56c, 0x4, 0x0, 0x1, 0x1ff, 0x1, 0xc0fa, 0x3ff, 0x3, 0x5, 0x0, 0x29, 0x7, @perf_bp={&(0x7f00000001c0), 0x9}, 0x4000, 0x53, 0x10001, 0x7, 0x5, 0x7fff, 0x1}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xb) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x7) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000080000000850000000600000000000000000000009500000000000000"], &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0xe4, &(0x7f0000000400)=""/228}, 0x48) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) 2018/03/30 19:03:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:20 executing program 0 (fault-call:15 fault-nth:19): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:20 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f00000003c0)=@raw=[@jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:20 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)={&(0x7f00000002c0)='./file0\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r0) 2018/03/30 19:03:20 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x88, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ec"}], 0x158, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 283.643637] FAULT_INJECTION: forcing a failure. [ 283.643637] name failslab, interval 1, probability 0, space 0, times 0 [ 283.655091] CPU: 0 PID: 18556 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 283.662512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.671876] Call Trace: [ 283.674474] dump_stack+0x194/0x24d [ 283.678105] ? arch_local_irq_restore+0x53/0x53 [ 283.682773] ? __save_stack_trace+0x7e/0xd0 [ 283.687099] should_fail+0x8c0/0xa40 2018/03/30 19:03:20 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x88, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ec"}], 0x158, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) [ 283.690821] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 283.695963] ? kasan_kmalloc+0xad/0xe0 [ 283.699859] ? kmem_cache_alloc_trace+0x136/0x740 [ 283.704800] ? __memcg_init_list_lru_node+0x169/0x270 [ 283.710001] ? __list_lru_init+0x544/0x750 [ 283.714241] ? sget_userns+0x691/0xe40 [ 283.718136] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 283.722903] ? do_mount+0xea4/0x2bb0 [ 283.726613] ? SyS_mount+0xab/0x120 [ 283.730230] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.735628] ? find_held_lock+0x35/0x1d0 [ 283.739682] ? __lock_is_held+0xb6/0x140 [ 283.743732] ? check_same_owner+0x320/0x320 [ 283.748035] ? rcu_note_context_switch+0x710/0x710 [ 283.752950] should_failslab+0xec/0x120 [ 283.756926] kmem_cache_alloc_trace+0x4b/0x740 [ 283.761488] ? __kmalloc_node+0x33/0x70 [ 283.765442] ? __kmalloc_node+0x33/0x70 [ 283.769412] ? rcu_read_lock_sched_held+0x108/0x120 [ 283.774422] __memcg_init_list_lru_node+0x169/0x270 [ 283.779684] ? list_lru_add+0x7c0/0x7c0 [ 283.783649] ? __kmalloc_node+0x47/0x70 [ 283.787867] __list_lru_init+0x544/0x750 [ 283.792031] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 283.797906] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 283.802916] ? __lockdep_init_map+0xe4/0x650 [ 283.807304] ? lockdep_init_map+0x9/0x10 [ 283.811347] sget_userns+0x691/0xe40 [ 283.815039] ? set_anon_super+0x20/0x20 [ 283.818990] ? put_filp+0x90/0x90 [ 283.822422] ? destroy_unused_super.part.6+0xd0/0xd0 [ 283.827503] ? alloc_vfsmnt+0x762/0x9c0 [ 283.831452] ? path_lookupat+0x238/0xba0 [ 283.835489] ? mnt_free_id.isra.21+0x50/0x50 [ 283.839881] ? trace_hardirqs_off+0x10/0x10 [ 283.844184] ? putname+0xee/0x130 [ 283.847622] ? cap_capable+0x1b5/0x230 [ 283.851493] ? security_capable+0x8e/0xc0 [ 283.855621] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 283.860810] ? ns_capable_common+0xcf/0x160 [ 283.865113] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 283.870280] mount_ns+0x6d/0x190 [ 283.873625] rpc_mount+0x9e/0xd0 [ 283.876971] mount_fs+0x66/0x2d0 [ 283.880333] vfs_kern_mount.part.26+0xc6/0x4a0 [ 283.884893] ? may_umount+0xa0/0xa0 [ 283.888497] ? _raw_read_unlock+0x22/0x30 [ 283.892630] ? __get_fs_type+0x8a/0xc0 [ 283.896497] do_mount+0xea4/0x2bb0 [ 283.900020] ? __might_fault+0x110/0x1d0 [ 283.904062] ? copy_mount_string+0x40/0x40 [ 283.908283] ? __check_object_size+0x8b/0x530 [ 283.912763] ? __might_sleep+0x95/0x190 [ 283.916721] ? kasan_check_write+0x14/0x20 [ 283.920935] ? _copy_from_user+0x99/0x110 [ 283.925062] ? memdup_user+0x5e/0x90 [ 283.928754] ? copy_mount_options+0x1f7/0x2e0 [ 283.933227] SyS_mount+0xab/0x120 [ 283.936669] ? copy_mnt_ns+0xb30/0xb30 [ 283.940534] do_syscall_64+0x281/0x940 [ 283.944397] ? vmalloc_sync_all+0x30/0x30 [ 283.948522] ? _raw_spin_unlock_irq+0x27/0x70 [ 283.953008] ? finish_task_switch+0x1c1/0x7e0 [ 283.957494] ? syscall_return_slowpath+0x550/0x550 [ 283.962412] ? syscall_return_slowpath+0x2ac/0x550 [ 283.967328] ? prepare_exit_to_usermode+0x350/0x350 [ 283.972324] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 283.977762] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.982585] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.987751] RIP: 0033:0x454e79 2018/03/30 19:03:20 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 283.990935] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.998638] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 284.005901] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 284.013146] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 284.020391] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 284.027640] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 2018/03/30 19:03:20 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x3, 0x4, &(0x7f0000000040)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xd, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18f8ff030000000000000000800000000601ffff060000000000000000000000181b0000", @ANYRES32=r0, @ANYBLOB="00bacec60000000000000085000000110000000000000000000000850000001f00000000000000000000009500000000000000143193fc823092b98f6ca7ffffffff000000002d12e86bfcbf1a8c0b164a0d7b677dafb0bd6147d4c03f685e"], &(0x7f0000000100)='syzkaller\x00', 0x1c, 0x81, &(0x7f0000000180)=""/129, 0x41f00, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) socketpair(0x9, 0x4, 0x4a4, &(0x7f0000000080)) 2018/03/30 19:03:20 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x88, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ec"}], 0x158, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x88, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ec"}], 0x158, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:21 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 0 (fault-call:15 fault-nth:20): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:21 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x88, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ec"}], 0x158, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:21 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xc8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc"}], 0x198, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:21 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x7, 0x6, 0x5, 0x81, 0xa, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000002c0)) [ 284.678742] FAULT_INJECTION: forcing a failure. [ 284.678742] name failslab, interval 1, probability 0, space 0, times 0 [ 284.690087] CPU: 1 PID: 18617 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 284.697366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.706720] Call Trace: [ 284.709321] dump_stack+0x194/0x24d [ 284.712959] ? arch_local_irq_restore+0x53/0x53 [ 284.717635] ? kernel_text_address+0xd1/0xe0 [ 284.722047] ? __unwind_start+0x169/0x330 2018/03/30 19:03:21 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xc8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc"}], 0x198, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 284.726203] should_fail+0x8c0/0xa40 [ 284.729927] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 284.735043] ? kasan_kmalloc+0xad/0xe0 [ 284.738928] ? __kmalloc+0x162/0x760 [ 284.742658] ? __list_lru_init+0xcf/0x750 [ 284.747159] ? find_held_lock+0x35/0x1d0 [ 284.751232] ? __lock_is_held+0xb6/0x140 [ 284.755302] ? check_same_owner+0x320/0x320 [ 284.759675] ? rcu_note_context_switch+0x710/0x710 [ 284.764605] should_failslab+0xec/0x120 [ 284.768582] kmem_cache_alloc_node_trace+0x5a/0x760 [ 284.773598] ? mark_held_locks+0xaf/0x100 [ 284.777751] ? __raw_spin_lock_init+0x1c/0x100 [ 284.782346] __kmalloc_node+0x33/0x70 [ 284.786152] kvmalloc_node+0x99/0xd0 [ 284.789874] __list_lru_init+0x5d5/0x750 [ 284.793946] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 284.799836] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 284.804863] ? lockdep_init_map+0x9/0x10 [ 284.808928] sget_userns+0x6b1/0xe40 [ 284.812625] ? set_anon_super+0x20/0x20 [ 284.816589] ? put_filp+0x90/0x90 [ 284.820033] ? destroy_unused_super.part.6+0xd0/0xd0 [ 284.825117] ? alloc_vfsmnt+0x762/0x9c0 [ 284.829074] ? path_lookupat+0x238/0xba0 [ 284.833120] ? mnt_free_id.isra.21+0x50/0x50 [ 284.837613] ? trace_hardirqs_off+0x10/0x10 [ 284.841919] ? putname+0xee/0x130 [ 284.845404] ? cap_capable+0x1b5/0x230 [ 284.849366] ? security_capable+0x8e/0xc0 [ 284.853503] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 284.858681] ? ns_capable_common+0xcf/0x160 [ 284.862984] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 284.868163] mount_ns+0x6d/0x190 [ 284.871512] rpc_mount+0x9e/0xd0 [ 284.874862] mount_fs+0x66/0x2d0 [ 284.878210] vfs_kern_mount.part.26+0xc6/0x4a0 [ 284.882772] ? may_umount+0xa0/0xa0 [ 284.886558] ? _raw_read_unlock+0x22/0x30 [ 284.890685] ? __get_fs_type+0x8a/0xc0 [ 284.894557] do_mount+0xea4/0x2bb0 [ 284.898077] ? __might_fault+0x110/0x1d0 [ 284.902122] ? copy_mount_string+0x40/0x40 [ 284.906337] ? __check_object_size+0x8b/0x530 [ 284.910851] ? __might_sleep+0x95/0x190 [ 284.914812] ? kasan_check_write+0x14/0x20 [ 284.919031] ? _copy_from_user+0x99/0x110 [ 284.923163] ? memdup_user+0x5e/0x90 [ 284.926856] ? copy_mount_options+0x1f7/0x2e0 [ 284.931334] SyS_mount+0xab/0x120 [ 284.934763] ? copy_mnt_ns+0xb30/0xb30 [ 284.938631] do_syscall_64+0x281/0x940 [ 284.942498] ? vmalloc_sync_all+0x30/0x30 [ 284.946625] ? _raw_spin_unlock_irq+0x27/0x70 [ 284.951100] ? finish_task_switch+0x1c1/0x7e0 [ 284.955576] ? syscall_return_slowpath+0x550/0x550 [ 284.960487] ? syscall_return_slowpath+0x2ac/0x550 [ 284.965405] ? prepare_exit_to_usermode+0x350/0x350 [ 284.970402] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 284.975748] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.980575] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.985745] RIP: 0033:0x454e79 [ 284.988915] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.996604] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 285.003851] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 285.011102] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 285.018350] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 2018/03/30 19:03:21 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xc8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc"}], 0x198, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:21 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000240)={r1, &(0x7f0000000300)="e62a7515177ae073462522ceab77fec9874f00a6a1b5656720551a4ebbc2755b4914032278bef44d681dd78a24560600307fbc6ceff5f93a4738f3e1961a09003ca19d514984ea7d08e1e24aa89101acd2eae633835df98daa619a"}, 0x10) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x1ff) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000040)="7a8e17cd5ac5519d1a3ac4b685d2ef82945d5e34fd52261ad1f75ead8918d28754e9c469a5ca98284c8eb8012f15d5fb89f9200ed269df706ac4a4cff264ddf92b6758d26589ac4cac60dd820093aeef57c382fe362246ac76d43b37"}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x28, &(0x7f0000000100)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r2, 0x9, 0x8}, 0xc) [ 285.025598] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 2018/03/30 19:03:21 executing program 4: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000d300000000000000000040000000009500000082552e71845a84d2f9ad1b444697574bf2ebb9f341b564c239b0cb337b11ced6d6cf998f06788ceb75d39335a5325d76f7cf732058b8a31d79d51d0ca3ef44fb043c3885007684e041e10ca1bce23c5b81421e2dd28c524ae1ab4b4e37ca4924d398f72dd29e33595c4709ec71613c913344c9d09d71"], &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xfffffffffffffffe) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000000)) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) 2018/03/30 19:03:21 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={0xffffffffffffffff, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:21 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:21 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xc8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc"}], 0x198, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 0 (fault-call:15 fault-nth:21): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:22 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xc8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc"}], 0x198, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:22 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={0xffffffffffffffff, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:22 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 285.318907] FAULT_INJECTION: forcing a failure. [ 285.318907] name failslab, interval 1, probability 0, space 0, times 0 [ 285.330371] CPU: 0 PID: 18670 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 285.337646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.346984] Call Trace: [ 285.349559] dump_stack+0x194/0x24d [ 285.353188] ? arch_local_irq_restore+0x53/0x53 [ 285.357844] should_fail+0x8c0/0xa40 [ 285.361557] ? is_bpf_text_address+0xa4/0x120 [ 285.366040] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.371128] ? __kernel_text_address+0xd/0x40 [ 285.375612] ? unwind_get_return_address+0x61/0xa0 [ 285.380528] ? find_held_lock+0x35/0x1d0 [ 285.384572] ? __lock_is_held+0xb6/0x140 [ 285.388626] ? check_same_owner+0x320/0x320 [ 285.392931] ? rcu_note_context_switch+0x710/0x710 [ 285.397849] should_failslab+0xec/0x120 [ 285.401813] kmem_cache_alloc_trace+0x4b/0x740 [ 285.406387] ? __kmalloc_node+0x33/0x70 [ 285.410345] ? __kmalloc_node+0x33/0x70 [ 285.414299] ? rcu_read_lock_sched_held+0x108/0x120 [ 285.419304] __memcg_init_list_lru_node+0x169/0x270 [ 285.424299] ? list_lru_add+0x7c0/0x7c0 [ 285.428253] ? __kmalloc_node+0x47/0x70 [ 285.432206] __list_lru_init+0x544/0x750 [ 285.436249] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 285.442123] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 285.447127] ? lockdep_init_map+0x9/0x10 [ 285.451169] sget_userns+0x6b1/0xe40 [ 285.454867] ? set_anon_super+0x20/0x20 [ 285.458832] ? put_filp+0x90/0x90 [ 285.462271] ? destroy_unused_super.part.6+0xd0/0xd0 [ 285.467355] ? alloc_vfsmnt+0x762/0x9c0 [ 285.471305] ? path_lookupat+0x238/0xba0 [ 285.475340] ? mnt_free_id.isra.21+0x50/0x50 [ 285.479727] ? trace_hardirqs_off+0x10/0x10 [ 285.484041] ? putname+0xee/0x130 [ 285.487483] ? cap_capable+0x1b5/0x230 [ 285.491348] ? security_capable+0x8e/0xc0 [ 285.495479] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 285.500651] ? ns_capable_common+0xcf/0x160 [ 285.504955] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 285.510127] mount_ns+0x6d/0x190 [ 285.513475] rpc_mount+0x9e/0xd0 [ 285.516822] mount_fs+0x66/0x2d0 [ 285.520175] vfs_kern_mount.part.26+0xc6/0x4a0 [ 285.524748] ? may_umount+0xa0/0xa0 [ 285.528355] ? _raw_read_unlock+0x22/0x30 [ 285.532490] ? __get_fs_type+0x8a/0xc0 [ 285.536375] do_mount+0xea4/0x2bb0 [ 285.539904] ? __might_fault+0x110/0x1d0 [ 285.543965] ? copy_mount_string+0x40/0x40 [ 285.548197] ? check_same_owner+0x320/0x320 [ 285.552513] ? __check_object_size+0x8b/0x530 [ 285.557012] ? __might_sleep+0x95/0x190 [ 285.560979] ? kasan_check_write+0x14/0x20 [ 285.565188] ? _copy_from_user+0x99/0x110 [ 285.569311] ? memdup_user+0x5e/0x90 [ 285.572998] ? copy_mount_options+0x1f7/0x2e0 [ 285.577472] SyS_mount+0xab/0x120 [ 285.580900] ? copy_mnt_ns+0xb30/0xb30 [ 285.584761] do_syscall_64+0x281/0x940 [ 285.588623] ? vmalloc_sync_all+0x30/0x30 [ 285.592762] ? _raw_spin_unlock_irq+0x27/0x70 [ 285.597235] ? finish_task_switch+0x1c1/0x7e0 [ 285.601706] ? syscall_return_slowpath+0x550/0x550 [ 285.606609] ? syscall_return_slowpath+0x2ac/0x550 [ 285.611511] ? prepare_exit_to_usermode+0x350/0x350 [ 285.616507] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 285.621847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.626665] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.631839] RIP: 0033:0x454e79 [ 285.635001] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.642691] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 285.649937] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 285.657185] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/03/30 19:03:22 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xfffffffffffff001) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 2018/03/30 19:03:22 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00'}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 0 (fault-call:15 fault-nth:22): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:22 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xc8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc"}], 0x198, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:22 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:22 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={0xffffffffffffffff, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:22 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xe0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662f"}], 0x1b0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = getpid() r2 = perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0xffffffffffffffc1, 0x8, 0x8, 0x8000, 0x0, 0x63e, 0x1100, 0x1, 0xfffffffffffffff9, 0x100000000, 0x4, 0xb7, 0x7, 0x5, 0x101, 0x81, 0x4, 0x80, 0x7, 0x1800000000000, 0x6, 0x401, 0xc5a, 0x1000, 0x40, 0x2, 0x7f, 0x6, 0x4, 0x8000, 0x8, 0x2, 0x0, 0x5, 0xfffffffffffffff9, 0x5, 0x0, 0x1f, 0x0, @perf_config_ext={0x7, 0x43}, 0xa00, 0xfd3, 0x8000, 0x3, 0xa30, 0x1934, 0x6}, 0x0, 0x2, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x4, 0xee0d, 0x86f, 0x0, 0x0, 0x7, 0xc00, 0x0, 0xe80, 0x100, 0x5, 0x5, 0xffffffff, 0x2, 0xfffffffffffffffc, 0x100000000, 0x1, 0x8001, 0xffffffffffffcff4, 0x3, 0x9, 0x200, 0x9, 0x5, 0x1f, 0x9, 0x800, 0x9, 0x7fff, 0x80000001, 0x8, 0x0, 0x2000, 0xfff, 0x5, 0x614000000000, 0x0, 0x8000, 0x5, @perf_config_ext={0x7, 0x7c}, 0x10000, 0x5, 0xffffffffffffbab4, 0x7, 0x92, 0x9, 0x55}, r1, 0x2, r2, 0x2) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) [ 285.664434] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 285.671678] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 2018/03/30 19:03:22 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xe0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662f"}], 0x1b0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xe0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662f"}], 0x1b0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) [ 285.788090] FAULT_INJECTION: forcing a failure. [ 285.788090] name failslab, interval 1, probability 0, space 0, times 0 [ 285.799527] CPU: 0 PID: 18693 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 285.806807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.816162] Call Trace: [ 285.818786] dump_stack+0x194/0x24d [ 285.822419] ? arch_local_irq_restore+0x53/0x53 [ 285.827096] should_fail+0x8c0/0xa40 [ 285.830807] ? is_bpf_text_address+0xa4/0x120 [ 285.835303] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 285.840403] ? __kernel_text_address+0xd/0x40 [ 285.844901] ? unwind_get_return_address+0x61/0xa0 [ 285.849839] ? find_held_lock+0x35/0x1d0 [ 285.853910] ? __lock_is_held+0xb6/0x140 [ 285.857982] ? check_same_owner+0x320/0x320 [ 285.862304] ? rcu_note_context_switch+0x710/0x710 [ 285.867238] should_failslab+0xec/0x120 [ 285.871217] kmem_cache_alloc_trace+0x4b/0x740 [ 285.875799] ? __kmalloc_node+0x33/0x70 [ 285.879771] ? __kmalloc_node+0x33/0x70 [ 285.883757] ? rcu_read_lock_sched_held+0x108/0x120 [ 285.888790] __memcg_init_list_lru_node+0x169/0x270 [ 285.893813] ? list_lru_add+0x7c0/0x7c0 [ 285.897791] ? __kmalloc_node+0x47/0x70 [ 285.901783] __list_lru_init+0x544/0x750 [ 285.905851] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 285.911751] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 285.916779] ? lockdep_init_map+0x9/0x10 [ 285.920847] sget_userns+0x6b1/0xe40 [ 285.924561] ? set_anon_super+0x20/0x20 [ 285.928540] ? put_filp+0x90/0x90 [ 285.931994] ? destroy_unused_super.part.6+0xd0/0xd0 [ 285.937100] ? alloc_vfsmnt+0x762/0x9c0 [ 285.941077] ? path_lookupat+0x238/0xba0 [ 285.945148] ? mnt_free_id.isra.21+0x50/0x50 [ 285.949575] ? trace_hardirqs_off+0x10/0x10 [ 285.953899] ? putname+0xee/0x130 [ 285.957360] ? cap_capable+0x1b5/0x230 [ 285.961256] ? security_capable+0x8e/0xc0 [ 285.965405] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 285.970588] ? ns_capable_common+0xcf/0x160 [ 285.974909] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 285.980091] mount_ns+0x6d/0x190 [ 285.983452] rpc_mount+0x9e/0xd0 [ 285.986815] mount_fs+0x66/0x2d0 [ 285.990178] vfs_kern_mount.part.26+0xc6/0x4a0 [ 285.994752] ? may_umount+0xa0/0xa0 [ 285.998373] ? _raw_read_unlock+0x22/0x30 [ 286.002514] ? __get_fs_type+0x8a/0xc0 [ 286.006400] do_mount+0xea4/0x2bb0 [ 286.009934] ? __might_fault+0x110/0x1d0 [ 286.013992] ? copy_mount_string+0x40/0x40 [ 286.018221] ? __check_object_size+0x8b/0x530 [ 286.022717] ? __might_sleep+0x95/0x190 [ 286.026692] ? kasan_check_write+0x14/0x20 [ 286.030924] ? _copy_from_user+0x99/0x110 [ 286.035072] ? memdup_user+0x5e/0x90 [ 286.038778] ? copy_mount_options+0x1f7/0x2e0 [ 286.043268] SyS_mount+0xab/0x120 [ 286.046719] ? copy_mnt_ns+0xb30/0xb30 [ 286.050603] do_syscall_64+0x281/0x940 [ 286.054482] ? vmalloc_sync_all+0x30/0x30 [ 286.058623] ? _raw_spin_unlock_irq+0x27/0x70 [ 286.063113] ? finish_task_switch+0x1c1/0x7e0 [ 286.067606] ? syscall_return_slowpath+0x550/0x550 [ 286.072533] ? syscall_return_slowpath+0x2ac/0x550 [ 286.077461] ? prepare_exit_to_usermode+0x350/0x350 [ 286.082473] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 2018/03/30 19:03:22 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xe0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662f"}], 0x1b0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:22 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:22 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xe0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662f"}], 0x1b0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:22 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 286.087833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.092678] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.097863] RIP: 0033:0x454e79 [ 286.101047] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 286.108751] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 286.116018] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 286.123284] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 286.130546] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 286.137808] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/30 19:03:23 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) close(r0) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) 2018/03/30 19:03:23 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:23 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xe0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662f"}], 0x1b0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:23 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000001) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:23 executing program 0 (fault-call:15 fault-nth:23): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:23 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac6"}], 0x1c0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:23 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:23 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 286.608858] FAULT_INJECTION: forcing a failure. [ 286.608858] name failslab, interval 1, probability 0, space 0, times 0 [ 286.620177] CPU: 1 PID: 18744 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 286.627451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.636805] Call Trace: [ 286.639826] dump_stack+0x194/0x24d [ 286.643441] ? arch_local_irq_restore+0x53/0x53 [ 286.648093] ? __save_stack_trace+0x7e/0xd0 [ 286.652403] should_fail+0x8c0/0xa40 [ 286.656099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 286.661187] ? kasan_kmalloc+0xad/0xe0 [ 286.665052] ? kmem_cache_alloc_trace+0x136/0x740 [ 286.669882] ? __memcg_init_list_lru_node+0x169/0x270 [ 286.675051] ? __list_lru_init+0x544/0x750 [ 286.679266] ? sget_userns+0x6b1/0xe40 [ 286.683136] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 286.687875] ? do_mount+0xea4/0x2bb0 [ 286.691568] ? SyS_mount+0xab/0x120 [ 286.695177] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.700525] ? find_held_lock+0x35/0x1d0 [ 286.704573] ? __lock_is_held+0xb6/0x140 [ 286.708628] ? check_same_owner+0x320/0x320 [ 286.712948] ? rcu_note_context_switch+0x710/0x710 [ 286.717869] should_failslab+0xec/0x120 [ 286.721826] kmem_cache_alloc_trace+0x4b/0x740 [ 286.726388] ? __kmalloc_node+0x33/0x70 [ 286.730345] ? __kmalloc_node+0x33/0x70 [ 286.734304] ? rcu_read_lock_sched_held+0x108/0x120 [ 286.739306] __memcg_init_list_lru_node+0x169/0x270 [ 286.744309] ? list_lru_add+0x7c0/0x7c0 [ 286.748270] ? __kmalloc_node+0x47/0x70 [ 286.752231] __list_lru_init+0x544/0x750 [ 286.756364] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 286.762234] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 286.767236] ? lockdep_init_map+0x9/0x10 [ 286.771282] sget_userns+0x6b1/0xe40 [ 286.774973] ? set_anon_super+0x20/0x20 [ 286.778933] ? put_filp+0x90/0x90 [ 286.782366] ? destroy_unused_super.part.6+0xd0/0xd0 [ 286.787448] ? alloc_vfsmnt+0x762/0x9c0 [ 286.791400] ? path_lookupat+0x238/0xba0 [ 286.795444] ? mnt_free_id.isra.21+0x50/0x50 [ 286.799837] ? trace_hardirqs_off+0x10/0x10 [ 286.804146] ? putname+0xee/0x130 [ 286.807586] ? cap_capable+0x1b5/0x230 [ 286.811459] ? security_capable+0x8e/0xc0 [ 286.815592] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 286.820866] ? ns_capable_common+0xcf/0x160 [ 286.825171] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 286.830342] mount_ns+0x6d/0x190 [ 286.833691] rpc_mount+0x9e/0xd0 [ 286.837042] mount_fs+0x66/0x2d0 [ 286.840392] vfs_kern_mount.part.26+0xc6/0x4a0 [ 286.844957] ? may_umount+0xa0/0xa0 [ 286.848564] ? _raw_read_unlock+0x22/0x30 [ 286.852693] ? __get_fs_type+0x8a/0xc0 [ 286.856567] do_mount+0xea4/0x2bb0 [ 286.860088] ? __might_fault+0x110/0x1d0 [ 286.864140] ? copy_mount_string+0x40/0x40 [ 286.868376] ? __check_object_size+0x8b/0x530 [ 286.872867] ? __might_sleep+0x95/0x190 [ 286.876829] ? kasan_check_write+0x14/0x20 [ 286.881048] ? _copy_from_user+0x99/0x110 [ 286.885180] ? memdup_user+0x5e/0x90 [ 286.888871] ? copy_mount_options+0x1f7/0x2e0 [ 286.893348] SyS_mount+0xab/0x120 [ 286.896790] ? copy_mnt_ns+0xb30/0xb30 [ 286.900658] do_syscall_64+0x281/0x940 [ 286.904527] ? vmalloc_sync_all+0x30/0x30 [ 286.908654] ? _raw_spin_unlock_irq+0x27/0x70 [ 286.913138] ? finish_task_switch+0x1c1/0x7e0 [ 286.917618] ? syscall_return_slowpath+0x550/0x550 [ 286.922528] ? syscall_return_slowpath+0x2ac/0x550 [ 286.927439] ? prepare_exit_to_usermode+0x350/0x350 [ 286.932435] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 286.937787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.942614] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.947799] RIP: 0033:0x454e79 [ 286.950970] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:03:23 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac6"}], 0x1c0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:23 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002a00000027000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000004640)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 286.958660] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 286.965911] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 286.973162] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 286.980415] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 286.987665] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/30 19:03:24 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:24 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:24 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffff, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0xb9, 0xcc, &(0x7f0000000200)="eb44257da3363d251dc3470313bf659b4b2c5d2540da1dea13fb1b4c83d6337c04c7f1a208abd4ede5af844aea729053b1b1bc8ad3b6fc7161b7f6e9b142deee6a2ca40025b0562178bf209cb011466bd7e3802930942acd3d713caad73448450faca5c50f9acf90ffc85a11408e8bc7f05dbe27d553eba408ccf75cbf0a265a29b6797cecad034d0589d8ebb2d182eb9b0073136ffe2f9d9cfa0f19f4e3d04e48782de6335b4a405761bf925a101a58557e4dba2548c32b49", &(0x7f00000002c0)=""/204, 0x7f, 0xce}, 0x28) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f00000001c0)='./file0\x00', 0x0, 0x14}, 0x379) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r2, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:24 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:24 executing program 0 (fault-call:15 fault-nth:24): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:24 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac6"}], 0x1c0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x99, &(0x7f00000002c0)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000008500000006000000000000000000000095000000ed00000000"], &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) 2018/03/30 19:03:24 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac6"}], 0x1c0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:24 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r6}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r7, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000008300), 0x4) 2018/03/30 19:03:24 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac6"}], 0x1c0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 287.473533] FAULT_INJECTION: forcing a failure. [ 287.473533] name failslab, interval 1, probability 0, space 0, times 0 [ 287.484864] CPU: 0 PID: 18775 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 287.492159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.501520] Call Trace: [ 287.504119] dump_stack+0x194/0x24d [ 287.507761] ? arch_local_irq_restore+0x53/0x53 [ 287.512442] ? __save_stack_trace+0x7e/0xd0 [ 287.516775] should_fail+0x8c0/0xa40 2018/03/30 19:03:24 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf0, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac6"}], 0x1c0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:24 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) [ 287.520500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 287.525618] ? kasan_kmalloc+0xad/0xe0 [ 287.529509] ? kmem_cache_alloc_trace+0x136/0x740 [ 287.534359] ? __memcg_init_list_lru_node+0x169/0x270 [ 287.539555] ? __list_lru_init+0x544/0x750 [ 287.543799] ? sget_userns+0x6b1/0xe40 [ 287.547697] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 287.552460] ? do_mount+0xea4/0x2bb0 [ 287.556173] ? SyS_mount+0xab/0x120 [ 287.559801] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.565170] ? find_held_lock+0x35/0x1d0 [ 287.569238] ? __lock_is_held+0xb6/0x140 [ 287.573309] ? check_same_owner+0x320/0x320 [ 287.577643] ? rcu_note_context_switch+0x710/0x710 [ 287.582591] should_failslab+0xec/0x120 [ 287.586569] kmem_cache_alloc_trace+0x4b/0x740 [ 287.591159] ? __kmalloc_node+0x33/0x70 [ 287.595142] ? __kmalloc_node+0x33/0x70 [ 287.599119] ? rcu_read_lock_sched_held+0x108/0x120 [ 287.604144] __memcg_init_list_lru_node+0x169/0x270 [ 287.609167] ? list_lru_add+0x7c0/0x7c0 [ 287.613150] ? __kmalloc_node+0x47/0x70 [ 287.617135] __list_lru_init+0x544/0x750 [ 287.621217] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 287.627112] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 287.632144] ? lockdep_init_map+0x9/0x10 [ 287.636221] sget_userns+0x6b1/0xe40 [ 287.639934] ? set_anon_super+0x20/0x20 [ 287.643913] ? put_filp+0x90/0x90 [ 287.647371] ? destroy_unused_super.part.6+0xd0/0xd0 [ 287.652473] ? alloc_vfsmnt+0x762/0x9c0 [ 287.656445] ? path_lookupat+0x238/0xba0 [ 287.660488] ? mnt_free_id.isra.21+0x50/0x50 [ 287.664892] ? trace_hardirqs_off+0x10/0x10 [ 287.669196] ? putname+0xee/0x130 [ 287.672633] ? cap_capable+0x1b5/0x230 [ 287.676511] ? security_capable+0x8e/0xc0 [ 287.680655] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 287.685829] ? ns_capable_common+0xcf/0x160 [ 287.690135] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 287.695304] mount_ns+0x6d/0x190 [ 287.698655] rpc_mount+0x9e/0xd0 [ 287.702009] mount_fs+0x66/0x2d0 [ 287.705368] vfs_kern_mount.part.26+0xc6/0x4a0 [ 287.709931] ? may_umount+0xa0/0xa0 [ 287.713540] ? _raw_read_unlock+0x22/0x30 [ 287.717666] ? __get_fs_type+0x8a/0xc0 [ 287.721537] do_mount+0xea4/0x2bb0 [ 287.725057] ? __might_fault+0x110/0x1d0 [ 287.729104] ? copy_mount_string+0x40/0x40 [ 287.733323] ? __check_object_size+0x8b/0x530 [ 287.737804] ? __might_sleep+0x95/0x190 [ 287.741763] ? kasan_check_write+0x14/0x20 [ 287.745981] ? _copy_from_user+0x99/0x110 [ 287.750115] ? memdup_user+0x5e/0x90 [ 287.753809] ? copy_mount_options+0x1f7/0x2e0 [ 287.758287] SyS_mount+0xab/0x120 [ 287.761720] ? copy_mnt_ns+0xb30/0xb30 [ 287.765590] do_syscall_64+0x281/0x940 [ 287.769457] ? vmalloc_sync_all+0x30/0x30 [ 287.773588] ? _raw_spin_unlock_irq+0x27/0x70 [ 287.778066] ? finish_task_switch+0x1c1/0x7e0 [ 287.782545] ? syscall_return_slowpath+0x550/0x550 [ 287.787484] ? syscall_return_slowpath+0x2ac/0x550 [ 287.792399] ? prepare_exit_to_usermode+0x350/0x350 [ 287.797404] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 287.802759] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.807592] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.812762] RIP: 0033:0x454e79 [ 287.815932] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:03:24 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000340)={0xffffffffffffffff}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000004c0)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000400)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000440)={r4, r0}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000480)={0x1, 0x0, [0x0]}) 2018/03/30 19:03:24 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet(0x1e, 0x5, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmsg(r2, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000007c0)="ca4573abcf2079e0824362e17b8e4c08d48d13f3cd3d95e78c2b1c48bca7576db4209ea51b228d7caff935680b7c7b73ae6d8990f56b", 0x36}], 0x1, &(0x7f0000000980)}, 0x20000000) recvmsg(r1, &(0x7f0000000040)={&(0x7f0000006980)=ANY=[@ANYRES32=0x0], 0x1, &(0x7f0000006d00)=[{&(0x7f0000006c40)=""/181, 0xb5}], 0x1, &(0x7f0000006d40)=""/65, 0x41}, 0x0) sendmsg(r2, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000400)='v', 0x1}], 0x1, &(0x7f0000000440)=ANY=[]}, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x8000000) sendmsg(r1, &(0x7f0000000880)={&(0x7f0000000680)=@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000700)="fc717e9226dfef9f2f803a5b66dbb85b1aa905c2ea4d00d078a32c7cb7d85981", 0x20}, {&(0x7f0000000740)="fc597a71f7c50329d27b12ee8879bdf10e1cc84afb999758ced00a9a9c67e0a17275", 0x22}, {&(0x7f0000000800)="3c71733efa25fe22aa84eb639654bc7e43a91a69444e98831ed036b88727e8eef1ede7cce1ed0451bae867895cedabd543318b9e8ecd2bb1233bc79b71dac61b73267fb457a691d579c471a0658f8bd571c60c65630802ccda7e617c0e7e65f01d09d3ec691a4a13167d8032a397d17933f7", 0x72}], 0x3, 0x0, 0x0, 0x8000}, 0x4) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000240)='afs\x00', 0x2005800, &(0x7f0000000100)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000300)='./file0/file0\x00', &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000280)='hfs\x00', 0x1001, 0x0) mount(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='vfat\x00', 0x0, &(0x7f00000000c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x2, &(0x7f0000000100)=@raw=[@generic], &(0x7f0000000640)='GPL\x00', 0x2, 0x67, &(0x7f00000001c0)=""/103, 0x0, 0x0, [], r3}, 0x48) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='nfs\x00', 0x842, &(0x7f0000000440)="c85dd7ea2152150c9c316bd36d15d21b56bd46daa5c06e051507d772bbbbad75df97d7cb0e8b6b97c23631723fcd98a1ec7ee5224ee6b387c07f9b26e429d4398af5d3ea3002815d95173e75d152cf02bb9784b7e9702cb07d9276af29939a7d1acff6be66ade9c17f629790857baf1484a66c96e652d3fecfda299592ce58b8be17de47093b0f9a5e0dec53367d3ab9a108ba55e72d025552dbc881dfdab77d159cb8c0359a10") socketpair(0x17, 0xa, 0x6, &(0x7f00000008c0)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000001140)={&(0x7f0000000f00)=@hci={0x0, 0x0}, 0x80, &(0x7f0000001040)=[{&(0x7f0000000f80)=""/117, 0x75}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000001000)=""/37, 0x25}], 0x3, &(0x7f0000001080)=""/167, 0xa7, 0x6}, 0x0) sendmsg$kcm(r4, &(0x7f0000001700)={&(0x7f0000001180)=@can={0x1d, r5}, 0x80, &(0x7f0000001400)=[{&(0x7f0000001200)="078122b4323b4750a70deb44d0ef2b0984143c35d0613df30c074eed5c06610213dfc3cc445aad3039ec5b4684bbb2325ffc8badc230e3a9a954fc0ae1cdac60e39acfcc6bd661b31c13e53fa4909cc9b7955dfc22a0ea94b86d094926433cbbf7e4ce21bce6bb1f667e48ca507b8af0764c102c39c69ac908aef0b659556f22de3604dd232b217250475350917de04fcf88f6dcb0696e326c125735e837c5a994f79ad0cbcb43de0fbd62217cb99c890be275043ca899c488dfbb1cd46029726b29f0688f518d38b9d08bf8075095619ec4d25812e56eaee2c69c51435e50a24345f33e03a0a02501fbc23b5dca6096f379", 0xf2}, {&(0x7f0000001300)="2ad76e9fbbb4067ce95bbea0510f627b73c95db8785076a6609d951f711e2f8d33f8f4bb5b6382b7c2387982cf6e4510eaca4e1f0748b62cd086787dd3dbfd03070fd42a4dcbfd9cbc09d8e60d0fa69dec72471f6b43892a8e893a84df09a95a4b85afdf8167c63387787e31e3f5f6a60ffee1a5bdba874fd2357d686b2d5ed40425ae0ffa571b985aee96b44d658959684ba2f70acb9328c083590a12d14c115ad88e80d2a32937e6cbbe04c277f72a6008c5c9c3268620501b5358284cc6a4e4148f2a60215b7553912b47506f1dce41f48c0077432802d3d69a92e2f97eec86ec904a0933b922c5ffd104a245d605b477c455", 0xf4}], 0x2, &(0x7f0000001440)=[{0xf0, 0x3a, 0x523, "53db9c3bfc4ffa8af60d8ae711038fda9cf2f74cc27c98ce97a375846f50acdd105d55327bb70c5922681e315bde2671bb990dc9bbf6892da0b4335c5a9e92e2ff1bbc26c60d451abb113e94c2390859b3d9dcb865b0126841200ca2724db57bf806ee21324dcaf57b410502bddb9592d556ec6cab9722b2810346202bc7084df2edad0ca8e355333790482efaa22eb256e8fb569d9f540d21f6b0d9134c894bf54b4b07d675f66de33ca4e29db7e8bb8bab93b7e2cec883947699207319ca4a9d7d36cd6fad638cd74b3df76e828b9f33f6a8a8ecacf1de81a19361"}, {0x110, 0x114, 0x3, "815842f878c8e6d6a117a75fe1915d834aa0a54fa08d9922866e22aa3167edfed27cdd06c46c2623494fa6bb6298ff5d7808961402ef00eb4eab299e24d1b36896ddc14003cd65ecfea13a16c92de02b8207a1bbc12cf08a6dc395209e60a91bff54dacfe4f9269b5d3f320801167f6223d8a5b0af8b8f88ed1177f96f8de2354f0cd009932f6e1de5161233715765c793ea6014ed5f3590f1d38a4d31ba6f246ed09c3551718b311591566cf9366339786acdb00b6c463101b202dca3b4f8f25aa92cf42e05567700bfd16a608fd53264fe30f1c2464e3ce83c979b0c1259eb694646b4786b90c68318acef5a38be1d41e2e1f443799bcb73"}, {0xb0, 0x0, 0x2, "8792cf071cba03a337d3c9604391ba05b14c0b4a15f83179a6273184bb9469165faa111784c3828e33ec6d57ee0d4eeecf362f1132cb075edfd01b84f474b10934dd65710dce2c43372a1567fab53c6c775422fd4b5173eb318420fce703f182d8a65e0603f63ee487eab6674aee335c844f5b3777abfd3a930da43d12cf5caecfb33b969d9218c7ad6af0bb505ecd1da3747f179fbecac3267089"}], 0x2b0, 0x400c000}, 0x10) socketpair$ax25(0x3, 0x0, 0xcc, &(0x7f0000000080)) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r6, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={0xffffffffffffff9c}) sendmsg$kcm(r7, &(0x7f0000000380)={&(0x7f0000000080)=@rc={0x1f, {0x80000001, 0x1, 0x5, 0x80000000, 0x3f, 0xffffffffffff8000}, 0x7}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000100)="496ed168a34db964a836b722676c291a0a795d220995959ddf1899b0", 0x1c}, {&(0x7f0000000180)}, {&(0x7f00000001c0)="73c698997688aadd464025ff2dbefceddd639bff05ec00af5ac70128ae443bdfbc0b41a93a670a27a4ee1e1dc517d98a364e07a33435b32bf1bab2fd054fd5a793f4558d72e24b9aa9a38e23b0c836ce8f1df91da0e435967f22f76f192a17cb4d26ec41c0d9f3d9b31396ca54cbc670978155e76b229444d22ebe86e7a697ccf7bc47fd95a236e0ffded954c9e3feb9b485edc2ad068f7671eb54b36c673c5d117890b17a2188db504f69eddca7d6a296c6b8b26858db04a1", 0xb9}, {&(0x7f0000000280)="fe6d5d1125473dfa100eb720a4cd954fce2f0315118a82d6a8e613584e18b5359d3612cd8e2a6f4ec58efe8fc3d3b1c1923a1f045c82ebe77b2cdc5bdf358110a4f5fe14c35b638bc6ea0e8d2f441b352e635cce72d0ed3edd0f2e6819f1d399d537d5701f204ae3ebeb7e37db0b42b117471e2dcc2e241be072484cbde09033439b694d17b054114fa748f519c73de610224629f391a7ef70daf5b87e17ae6b7fc6b8740bbc74cc7e678a56c6e930d3b4f9ece1143caedde22a721bd1c81e3f3aca7a7c1c921040", 0xc8}, {&(0x7f0000000500)="1c33dab0aa113fb0173bc19a352d84a76cd77f250e8b7e1ad87ece4ab34e47d3ed941a3e614813db41ba28011a45880e392baf367905e269c854daf09c50909e1b295def3c493c11dc5c40c2e4380a29039bf0f2160d7db4625e5f52e2e3963a402472a76e3483585b5b91b974c91a331b937fb8ce0a1348c4e781129e12321572aac763", 0x84}], 0x5}, 0x4008041) 2018/03/30 19:03:24 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r6}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r7, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000008300), 0x4) 2018/03/30 19:03:24 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544"}], 0x1c8, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 287.823621] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 287.830880] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 287.838132] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 287.845382] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 287.852634] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 2018/03/30 19:03:24 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:25 executing program 4: socketpair(0xf, 0x6, 0x40, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0xf, 0x7fff, 0x5129, 0x40c6, 0x8, r0}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) 2018/03/30 19:03:25 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r6}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r7, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r7, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r5}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000008300), 0x4) 2018/03/30 19:03:25 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000040)="3ba424e63c8f5da742e5049d6005d9f09d69cf552476a9cef523a828d74c832d84051675ba886a554a8f49296af6009388a88220492443d56b7e281c91b154d5699b9069b5d6cc7e7c6eee5eba3faf282fbe49550d5d6e67d12d55f4fd5cc843a8f79d2bc1aa511abb86caacea253c04d000a0580b402625de82a375f0fd02a1d6a377450cc349ea8499211b2815b9f912f3029bb6b719ab34402ad0097888116314d3d1d0a3a22341d4f80eb63bbc86eae158087e52cf09940ff2f35c9155bf233d05b83bed225bdc8e8010099adbcb2d", &(0x7f0000000180)=""/15}, 0x18) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:25 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544"}], 0x1c8, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:25 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:25 executing program 0 (fault-call:15 fault-nth:25): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:25 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, 0xffffffffffffffff) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:25 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544"}], 0x1c8, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:25 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 288.383536] FAULT_INJECTION: forcing a failure. [ 288.383536] name failslab, interval 1, probability 0, space 0, times 0 [ 288.394871] CPU: 1 PID: 18827 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 288.402151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.411508] Call Trace: [ 288.414098] dump_stack+0x194/0x24d [ 288.417730] ? arch_local_irq_restore+0x53/0x53 [ 288.422405] ? __save_stack_trace+0x7e/0xd0 [ 288.426741] should_fail+0x8c0/0xa40 [ 288.430461] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 288.435563] ? kasan_kmalloc+0xad/0xe0 [ 288.439447] ? kmem_cache_alloc_trace+0x136/0x740 [ 288.444276] ? __memcg_init_list_lru_node+0x169/0x270 [ 288.449445] ? __list_lru_init+0x544/0x750 [ 288.453661] ? sget_userns+0x6b1/0xe40 [ 288.457531] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 288.462264] ? do_mount+0xea4/0x2bb0 [ 288.465959] ? SyS_mount+0xab/0x120 [ 288.469569] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.474921] ? find_held_lock+0x35/0x1d0 [ 288.478969] ? __lock_is_held+0xb6/0x140 [ 288.483035] ? check_same_owner+0x320/0x320 [ 288.487346] ? rcu_note_context_switch+0x710/0x710 [ 288.492265] should_failslab+0xec/0x120 [ 288.496221] kmem_cache_alloc_trace+0x4b/0x740 [ 288.500784] ? __kmalloc_node+0x33/0x70 [ 288.504736] ? __kmalloc_node+0x33/0x70 [ 288.508777] ? rcu_read_lock_sched_held+0x108/0x120 [ 288.513777] __memcg_init_list_lru_node+0x169/0x270 [ 288.518776] ? list_lru_add+0x7c0/0x7c0 [ 288.522729] ? __kmalloc_node+0x47/0x70 [ 288.526687] __list_lru_init+0x544/0x750 [ 288.530735] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 288.536614] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 288.541618] ? lockdep_init_map+0x9/0x10 [ 288.545665] sget_userns+0x6b1/0xe40 [ 288.549360] ? set_anon_super+0x20/0x20 [ 288.553319] ? put_filp+0x90/0x90 [ 288.556756] ? destroy_unused_super.part.6+0xd0/0xd0 [ 288.561840] ? alloc_vfsmnt+0x762/0x9c0 [ 288.565794] ? path_lookupat+0x238/0xba0 [ 288.569837] ? mnt_free_id.isra.21+0x50/0x50 [ 288.574246] ? trace_hardirqs_off+0x10/0x10 [ 288.578574] ? putname+0xee/0x130 [ 288.582017] ? cap_capable+0x1b5/0x230 [ 288.585892] ? security_capable+0x8e/0xc0 [ 288.590032] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 288.595205] ? ns_capable_common+0xcf/0x160 [ 288.599508] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 288.604677] mount_ns+0x6d/0x190 [ 288.608035] rpc_mount+0x9e/0xd0 [ 288.611383] mount_fs+0x66/0x2d0 [ 288.614736] vfs_kern_mount.part.26+0xc6/0x4a0 [ 288.619312] ? may_umount+0xa0/0xa0 [ 288.622919] ? _raw_read_unlock+0x22/0x30 [ 288.627053] ? __get_fs_type+0x8a/0xc0 [ 288.630939] do_mount+0xea4/0x2bb0 [ 288.634461] ? __might_fault+0x110/0x1d0 [ 288.638509] ? copy_mount_string+0x40/0x40 [ 288.642727] ? __check_object_size+0x8b/0x530 [ 288.647208] ? __might_sleep+0x95/0x190 [ 288.651172] ? kasan_check_write+0x14/0x20 [ 288.655389] ? _copy_from_user+0x99/0x110 [ 288.659519] ? memdup_user+0x5e/0x90 [ 288.663212] ? copy_mount_options+0x1f7/0x2e0 [ 288.667689] SyS_mount+0xab/0x120 [ 288.671124] ? copy_mnt_ns+0xb30/0xb30 [ 288.674996] do_syscall_64+0x281/0x940 [ 288.678864] ? vmalloc_sync_all+0x30/0x30 [ 288.682998] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 288.688521] ? syscall_return_slowpath+0x550/0x550 [ 288.693434] ? syscall_return_slowpath+0x2ac/0x550 [ 288.698351] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 288.703791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.708623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.713804] RIP: 0033:0x454e79 [ 288.716975] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 288.724669] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 2018/03/30 19:03:25 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544"}], 0x1c8, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x7c, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) socketpair$inet(0x2, 0x4, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000300)=r0, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x6, 0xea, &(0x7f0000000340)="0dae24d47e6a", &(0x7f0000000400)=""/234, 0x8, 0x1}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r1, 0x50, &(0x7f0000000540)}, 0x10) 2018/03/30 19:03:25 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:25 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544"}], 0x1c8, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 288.731919] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 288.739167] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 288.746417] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 288.753666] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/30 19:03:25 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:25 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0xf8, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544"}], 0x1c8, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:25 executing program 0 (fault-call:15 fault-nth:26): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) [ 289.001682] FAULT_INJECTION: forcing a failure. [ 289.001682] name failslab, interval 1, probability 0, space 0, times 0 [ 289.013195] CPU: 1 PID: 18877 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 289.020465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.029818] Call Trace: [ 289.032407] dump_stack+0x194/0x24d [ 289.036038] ? arch_local_irq_restore+0x53/0x53 [ 289.040703] ? __save_stack_trace+0x7e/0xd0 [ 289.045029] should_fail+0x8c0/0xa40 [ 289.048744] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.053843] ? kasan_kmalloc+0xad/0xe0 [ 289.057728] ? kmem_cache_alloc_trace+0x136/0x740 [ 289.062563] ? __memcg_init_list_lru_node+0x169/0x270 [ 289.067746] ? __list_lru_init+0x544/0x750 [ 289.071980] ? sget_userns+0x6b1/0xe40 [ 289.075863] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.080608] ? do_mount+0xea4/0x2bb0 [ 289.084312] ? SyS_mount+0xab/0x120 [ 289.087931] ? do_syscall_64+0x281/0x940 [ 289.091991] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.097360] ? find_held_lock+0x35/0x1d0 [ 289.101419] ? __lock_is_held+0xb6/0x140 [ 289.105474] ? check_same_owner+0x320/0x320 [ 289.109778] ? rcu_note_context_switch+0x710/0x710 [ 289.114693] should_failslab+0xec/0x120 [ 289.118662] kmem_cache_alloc_trace+0x4b/0x740 [ 289.123221] ? __kmalloc_node+0x33/0x70 [ 289.127173] ? __kmalloc_node+0x33/0x70 [ 289.131129] ? rcu_read_lock_sched_held+0x108/0x120 [ 289.136128] __memcg_init_list_lru_node+0x169/0x270 [ 289.141132] ? list_lru_add+0x7c0/0x7c0 [ 289.145109] ? __kmalloc_node+0x47/0x70 [ 289.149077] __list_lru_init+0x544/0x750 [ 289.153126] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 289.158992] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 289.163998] ? lockdep_init_map+0x9/0x10 [ 289.168048] sget_userns+0x6b1/0xe40 [ 289.171743] ? set_anon_super+0x20/0x20 [ 289.175696] ? put_filp+0x90/0x90 [ 289.179123] ? destroy_unused_super.part.6+0xd0/0xd0 [ 289.184201] ? alloc_vfsmnt+0x762/0x9c0 [ 289.188152] ? path_lookupat+0x238/0xba0 [ 289.192210] ? mnt_free_id.isra.21+0x50/0x50 [ 289.196596] ? trace_hardirqs_off+0x10/0x10 [ 289.200892] ? putname+0xee/0x130 [ 289.204320] ? cap_capable+0x1b5/0x230 [ 289.208184] ? security_capable+0x8e/0xc0 [ 289.212310] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.217486] ? ns_capable_common+0xcf/0x160 [ 289.221797] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.226972] mount_ns+0x6d/0x190 [ 289.230330] rpc_mount+0x9e/0xd0 [ 289.233677] mount_fs+0x66/0x2d0 [ 289.237030] vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.241606] ? may_umount+0xa0/0xa0 [ 289.245256] ? _raw_read_unlock+0x22/0x30 [ 289.249485] ? __get_fs_type+0x8a/0xc0 [ 289.253356] do_mount+0xea4/0x2bb0 [ 289.256881] ? __might_fault+0x110/0x1d0 [ 289.260926] ? copy_mount_string+0x40/0x40 [ 289.265154] ? check_same_owner+0x320/0x320 [ 289.269458] ? __check_object_size+0x8b/0x530 [ 289.273930] ? __might_sleep+0x95/0x190 [ 289.277901] ? kasan_check_write+0x14/0x20 [ 289.282117] ? _copy_from_user+0x99/0x110 [ 289.286257] ? memdup_user+0x5e/0x90 [ 289.289955] ? copy_mount_options+0x1f7/0x2e0 [ 289.294428] SyS_mount+0xab/0x120 [ 289.297858] ? copy_mnt_ns+0xb30/0xb30 [ 289.301733] do_syscall_64+0x281/0x940 [ 289.305596] ? vmalloc_sync_all+0x30/0x30 [ 289.309816] ? _raw_spin_unlock_irq+0x27/0x70 [ 289.314289] ? finish_task_switch+0x1c1/0x7e0 [ 289.318761] ? syscall_return_slowpath+0x550/0x550 [ 289.323685] ? syscall_return_slowpath+0x2ac/0x550 [ 289.328606] ? prepare_exit_to_usermode+0x350/0x350 [ 289.333604] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 289.338948] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.343777] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.348965] RIP: 0033:0x454e79 2018/03/30 19:03:26 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:26 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483cc"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:26 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483cc"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:26 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000000800000045000000000000009501000000000000"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r1) 2018/03/30 19:03:26 executing program 0 (fault-call:15 fault-nth:27): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:26 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0x10, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @jmp={0x5, 0xa12, 0xf, 0xa, 0x0, 0x2, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:26 executing program 2: socketpair(0x1, 0x2, 0x2bfb, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x5, 0x6, 0x7f, 0xc, r0, 0x2}, 0x2c) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xfd, 0x7ff, 0x9}, 0x2c) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000000c0)) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000040)) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 289.352143] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.359829] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 289.367075] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 289.374319] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 289.381564] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 289.388818] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 289.479414] FAULT_INJECTION: forcing a failure. [ 289.479414] name failslab, interval 1, probability 0, space 0, times 0 [ 289.490740] CPU: 0 PID: 18900 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 289.498017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.507378] Call Trace: [ 289.509979] dump_stack+0x194/0x24d [ 289.513641] ? arch_local_irq_restore+0x53/0x53 [ 289.518308] ? __save_stack_trace+0x7e/0xd0 [ 289.522638] should_fail+0x8c0/0xa40 [ 289.526354] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 289.531460] ? kasan_kmalloc+0xad/0xe0 [ 289.535347] ? kmem_cache_alloc_trace+0x136/0x740 [ 289.540193] ? __memcg_init_list_lru_node+0x169/0x270 [ 289.545383] ? __list_lru_init+0x544/0x750 [ 289.549628] ? sget_userns+0x6b1/0xe40 [ 289.553521] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.558286] ? do_mount+0xea4/0x2bb0 [ 289.562001] ? SyS_mount+0xab/0x120 [ 289.565631] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.571005] ? find_held_lock+0x35/0x1d0 [ 289.575083] ? __lock_is_held+0xb6/0x140 [ 289.579163] ? check_same_owner+0x320/0x320 [ 289.583503] ? rcu_note_context_switch+0x710/0x710 [ 289.588465] should_failslab+0xec/0x120 [ 289.592447] kmem_cache_alloc_trace+0x4b/0x740 [ 289.597027] ? __kmalloc_node+0x33/0x70 [ 289.600991] ? __kmalloc_node+0x33/0x70 [ 289.604959] ? rcu_read_lock_sched_held+0x108/0x120 [ 289.609965] __memcg_init_list_lru_node+0x169/0x270 [ 289.614990] ? list_lru_add+0x7c0/0x7c0 [ 289.618951] ? __kmalloc_node+0x47/0x70 [ 289.623004] __list_lru_init+0x544/0x750 [ 289.627051] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 289.632919] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 289.637918] ? lockdep_init_map+0x9/0x10 [ 289.641962] sget_userns+0x6b1/0xe40 [ 289.645653] ? set_anon_super+0x20/0x20 [ 289.649606] ? put_filp+0x90/0x90 [ 289.653042] ? destroy_unused_super.part.6+0xd0/0xd0 [ 289.658732] ? alloc_vfsmnt+0x762/0x9c0 [ 289.662683] ? path_lookupat+0x238/0xba0 [ 289.666726] ? mnt_free_id.isra.21+0x50/0x50 [ 289.671116] ? trace_hardirqs_off+0x10/0x10 [ 289.675419] ? putname+0xee/0x130 [ 289.678852] ? cap_capable+0x1b5/0x230 [ 289.682718] ? security_capable+0x8e/0xc0 [ 289.686848] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.692022] ? ns_capable_common+0xcf/0x160 [ 289.696325] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 289.701492] mount_ns+0x6d/0x190 [ 289.704838] rpc_mount+0x9e/0xd0 [ 289.708183] mount_fs+0x66/0x2d0 [ 289.711529] vfs_kern_mount.part.26+0xc6/0x4a0 [ 289.716094] ? may_umount+0xa0/0xa0 [ 289.719701] ? _raw_read_unlock+0x22/0x30 [ 289.723827] ? __get_fs_type+0x8a/0xc0 [ 289.727697] do_mount+0xea4/0x2bb0 [ 289.731223] ? __might_fault+0x110/0x1d0 [ 289.735266] ? copy_mount_string+0x40/0x40 [ 289.739494] ? __check_object_size+0x8b/0x530 [ 289.743973] ? __might_sleep+0x95/0x190 [ 289.747930] ? kasan_check_write+0x14/0x20 [ 289.752144] ? _copy_from_user+0x99/0x110 [ 289.756273] ? memdup_user+0x5e/0x90 [ 289.759963] ? copy_mount_options+0x1f7/0x2e0 [ 289.764438] SyS_mount+0xab/0x120 [ 289.767867] ? copy_mnt_ns+0xb30/0xb30 [ 289.771758] do_syscall_64+0x281/0x940 [ 289.775623] ? vmalloc_sync_all+0x30/0x30 [ 289.779752] ? _raw_spin_unlock_irq+0x27/0x70 [ 289.784227] ? finish_task_switch+0x1c1/0x7e0 [ 289.788703] ? syscall_return_slowpath+0x550/0x550 [ 289.793609] ? syscall_return_slowpath+0x2ac/0x550 [ 289.798518] ? prepare_exit_to_usermode+0x350/0x350 [ 289.803512] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 289.808854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.813681] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.818859] RIP: 0033:0x454e79 [ 289.822029] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/30 19:03:26 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x1}, 0x48) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={0x0, r0, 0x3, 0x2}, 0x14) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0xffffffffffffd44c) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffff9c}) recvmsg$kcm(r2, &(0x7f0000000680)={&(0x7f0000000300)=@rc, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/192, 0xc0}, {&(0x7f00000004c0)=""/218, 0xda}], 0x2, &(0x7f0000000600)=""/113, 0x71}, 0x10000) 2018/03/30 19:03:26 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:26 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:26 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483cc"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:26 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483cc"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:26 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x8, 0x9, 0x8, 0x1f, 0xffffffffffffff9c, 0x7}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000200)="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"}, 0x1da) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0xfffffffffffffe86) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 289.829732] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 289.837417] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 289.844670] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 289.851920] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 289.859169] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b 2018/03/30 19:03:26 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:26 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:26 executing program 0 (fault-call:15 fault-nth:28): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:26 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x100000000, 0x2, 0x47a, 0x3ff, 0x0, 0x0, 0x4000, 0x8, 0x9, 0xcdcd, 0x0, 0x2, 0x6, 0x3, 0x20, 0x2, 0x100000001, 0xdbf6, 0x3, 0x9, 0x1a77, 0xd5a6, 0x65c7, 0x9afc, 0x8, 0x20cb, 0x1, 0x4, 0xd6, 0x9, 0x2, 0x2, 0x8001, 0x0, 0x1, 0x20, 0x0, 0x80000001, 0x7, @perf_config_ext={0x6}, 0x30200, 0x9, 0x200000000, 0x7, 0x200000, 0x6, 0x8}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 290.049273] FAULT_INJECTION: forcing a failure. [ 290.049273] name failslab, interval 1, probability 0, space 0, times 0 [ 290.060656] CPU: 1 PID: 18931 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 290.067933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.077295] Call Trace: [ 290.079901] dump_stack+0x194/0x24d [ 290.083536] ? arch_local_irq_restore+0x53/0x53 [ 290.088212] ? __save_stack_trace+0x7e/0xd0 [ 290.092549] should_fail+0x8c0/0xa40 [ 290.096275] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.101385] ? kasan_kmalloc+0xad/0xe0 [ 290.105280] ? kmem_cache_alloc_trace+0x136/0x740 [ 290.110133] ? __memcg_init_list_lru_node+0x169/0x270 [ 290.115329] ? __list_lru_init+0x544/0x750 [ 290.119565] ? sget_userns+0x6b1/0xe40 [ 290.123455] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 290.128290] ? do_mount+0xea4/0x2bb0 [ 290.131984] ? SyS_mount+0xab/0x120 [ 290.135599] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.140947] ? find_held_lock+0x35/0x1d0 [ 290.144999] ? __lock_is_held+0xb6/0x140 [ 290.149058] ? check_same_owner+0x320/0x320 [ 290.153365] ? rcu_note_context_switch+0x710/0x710 [ 290.158284] should_failslab+0xec/0x120 [ 290.162263] kmem_cache_alloc_trace+0x4b/0x740 [ 290.167008] ? __kmalloc_node+0x33/0x70 [ 290.170983] ? __kmalloc_node+0x33/0x70 [ 290.174947] ? rcu_read_lock_sched_held+0x108/0x120 [ 290.179954] __memcg_init_list_lru_node+0x169/0x270 [ 290.184981] ? list_lru_add+0x7c0/0x7c0 [ 290.188955] ? __kmalloc_node+0x47/0x70 [ 290.192924] __list_lru_init+0x544/0x750 [ 290.196972] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 290.202843] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 290.207860] ? lockdep_init_map+0x9/0x10 [ 290.211917] sget_userns+0x6b1/0xe40 [ 290.215639] ? set_anon_super+0x20/0x20 [ 290.219609] ? put_filp+0x90/0x90 [ 290.223059] ? destroy_unused_super.part.6+0xd0/0xd0 [ 290.228145] ? alloc_vfsmnt+0x762/0x9c0 [ 290.232098] ? path_lookupat+0x238/0xba0 [ 290.236140] ? mnt_free_id.isra.21+0x50/0x50 [ 290.240539] ? trace_hardirqs_off+0x10/0x10 [ 290.244842] ? putname+0xee/0x130 [ 290.248280] ? cap_capable+0x1b5/0x230 [ 290.252153] ? security_capable+0x8e/0xc0 [ 290.256285] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 290.261456] ? ns_capable_common+0xcf/0x160 [ 290.265768] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 290.270936] mount_ns+0x6d/0x190 [ 290.274288] rpc_mount+0x9e/0xd0 [ 290.277640] mount_fs+0x66/0x2d0 [ 290.281002] vfs_kern_mount.part.26+0xc6/0x4a0 [ 290.285570] ? may_umount+0xa0/0xa0 [ 290.289180] ? _raw_read_unlock+0x22/0x30 [ 290.293307] ? __get_fs_type+0x8a/0xc0 [ 290.297180] do_mount+0xea4/0x2bb0 [ 290.300702] ? __might_fault+0x110/0x1d0 [ 290.304751] ? copy_mount_string+0x40/0x40 [ 290.308975] ? __check_object_size+0x8b/0x530 [ 290.313461] ? __might_sleep+0x95/0x190 [ 290.317775] ? kasan_check_write+0x14/0x20 [ 290.321991] ? _copy_from_user+0x99/0x110 [ 290.326227] ? memdup_user+0x5e/0x90 [ 290.329924] ? copy_mount_options+0x1f7/0x2e0 [ 290.334412] SyS_mount+0xab/0x120 [ 290.337849] ? copy_mnt_ns+0xb30/0xb30 [ 290.341723] do_syscall_64+0x281/0x940 [ 290.345592] ? vmalloc_sync_all+0x30/0x30 [ 290.349724] ? _raw_spin_unlock_irq+0x27/0x70 [ 290.354206] ? finish_task_switch+0x1c1/0x7e0 [ 290.358684] ? syscall_return_slowpath+0x550/0x550 [ 290.363594] ? syscall_return_slowpath+0x2ac/0x550 [ 290.368509] ? prepare_exit_to_usermode+0x350/0x350 [ 290.373507] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 290.378860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.383692] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.388864] RIP: 0033:0x454e79 [ 290.392039] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.399732] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 290.406985] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 290.414240] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 290.421491] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 290.428744] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c 2018/03/30 19:03:27 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483cc"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:27 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:27 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483cc"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:27 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:27 executing program 0 (fault-call:15 fault-nth:29): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:27 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = getpid() r2 = perf_event_open(&(0x7f0000000440)={0x7, 0x70, 0xef, 0x1, 0x9, 0x7fffffff80000, 0x0, 0x1, 0x40, 0x8, 0xff, 0x8, 0x80000001, 0x0, 0x9, 0x2, 0x4873, 0xffffffffffffffff, 0x1d3, 0x100000001, 0x5, 0x105, 0x10001, 0x7, 0xfffffffffffffffc, 0x9, 0x2c6, 0x8001, 0x8, 0x200, 0x3f, 0x0, 0x4, 0x0, 0xcdb2, 0x80000001, 0x4, 0xb4, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000400), 0xb}, 0x28, 0x5, 0x6, 0x7, 0x3, 0xfe0, 0x1000}, 0x0, 0x4, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000300)={0x7, 0x70, 0x5, 0x1ff, 0x5, 0xd6, 0x0, 0x5, 0x2, 0x7, 0xfffffffffffffffe, 0x3, 0x4c, 0x0, 0x6, 0x7, 0x9d, 0x8, 0x8, 0x0, 0x7, 0x5, 0x1, 0x0, 0x7, 0x8, 0x1ff, 0xf1, 0x8, 0x800, 0xd48c, 0x6, 0x2c, 0x28ca40b8, 0x1, 0x101, 0xe, 0x6, 0x0, 0xfffffffffffffff9, 0x6, @perf_config_ext={0x101, 0x11}, 0x400, 0x1ff, 0x2, 0x5, 0x401, 0x5, 0x9a}, r1, 0x4, r2, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000002c0)) 2018/03/30 19:03:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 290.537605] FAULT_INJECTION: forcing a failure. [ 290.537605] name failslab, interval 1, probability 0, space 0, times 0 [ 290.548925] CPU: 0 PID: 18956 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 290.556206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.565568] Call Trace: [ 290.568167] dump_stack+0x194/0x24d [ 290.571800] ? arch_local_irq_restore+0x53/0x53 [ 290.576471] ? __save_stack_trace+0x7e/0xd0 [ 290.580803] should_fail+0x8c0/0xa40 2018/03/30 19:03:27 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe30"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:27 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe30"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:27 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:27 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f00000002c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x34) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) [ 290.584535] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 290.589639] ? kasan_kmalloc+0xad/0xe0 [ 290.593536] ? kmem_cache_alloc_trace+0x136/0x740 [ 290.598383] ? __memcg_init_list_lru_node+0x169/0x270 [ 290.603575] ? __list_lru_init+0x544/0x750 [ 290.607810] ? sget_userns+0x6b1/0xe40 [ 290.611699] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 290.616454] ? do_mount+0xea4/0x2bb0 [ 290.620168] ? SyS_mount+0xab/0x120 [ 290.623797] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.629166] ? find_held_lock+0x35/0x1d0 [ 290.633237] ? __lock_is_held+0xb6/0x140 2018/03/30 19:03:27 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={0xffffffffffffffff, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) [ 290.637311] ? check_same_owner+0x320/0x320 [ 290.641643] ? rcu_note_context_switch+0x710/0x710 [ 290.646586] should_failslab+0xec/0x120 [ 290.650573] kmem_cache_alloc_trace+0x4b/0x740 [ 290.655153] ? __kmalloc_node+0x33/0x70 [ 290.659115] ? __kmalloc_node+0x33/0x70 [ 290.663171] ? rcu_read_lock_sched_held+0x108/0x120 [ 290.668177] __memcg_init_list_lru_node+0x169/0x270 [ 290.673181] ? list_lru_add+0x7c0/0x7c0 [ 290.677139] ? __kmalloc_node+0x47/0x70 [ 290.681103] __list_lru_init+0x544/0x750 [ 290.685150] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 290.691025] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 290.696037] ? lockdep_init_map+0x9/0x10 [ 290.700089] sget_userns+0x6b1/0xe40 [ 290.703786] ? set_anon_super+0x20/0x20 [ 290.707756] ? put_filp+0x90/0x90 [ 290.711998] ? destroy_unused_super.part.6+0xd0/0xd0 [ 290.717266] ? alloc_vfsmnt+0x762/0x9c0 [ 290.721222] ? path_lookupat+0x238/0xba0 [ 290.726049] ? mnt_free_id.isra.21+0x50/0x50 [ 290.730442] ? trace_hardirqs_off+0x10/0x10 [ 290.734749] ? putname+0xee/0x130 [ 290.738188] ? cap_capable+0x1b5/0x230 [ 290.742063] ? security_capable+0x8e/0xc0 [ 290.746204] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 290.751376] ? ns_capable_common+0xcf/0x160 [ 290.755681] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 290.760853] mount_ns+0x6d/0x190 [ 290.764207] rpc_mount+0x9e/0xd0 [ 290.767557] mount_fs+0x66/0x2d0 [ 290.770926] vfs_kern_mount.part.26+0xc6/0x4a0 [ 290.775490] ? may_umount+0xa0/0xa0 [ 290.779098] ? _raw_read_unlock+0x22/0x30 [ 290.783226] ? __get_fs_type+0x8a/0xc0 [ 290.787110] do_mount+0xea4/0x2bb0 [ 290.790647] ? __might_fault+0x110/0x1d0 [ 290.794695] ? copy_mount_string+0x40/0x40 [ 290.798914] ? __check_object_size+0x8b/0x530 [ 290.803398] ? __might_sleep+0x95/0x190 [ 290.807363] ? kasan_check_write+0x14/0x20 [ 290.811597] ? _copy_from_user+0x99/0x110 [ 290.815728] ? memdup_user+0x5e/0x90 [ 290.819421] ? copy_mount_options+0x1f7/0x2e0 [ 290.823902] SyS_mount+0xab/0x120 [ 290.827345] ? copy_mnt_ns+0xb30/0xb30 [ 290.831217] do_syscall_64+0x281/0x940 [ 290.835086] ? vmalloc_sync_all+0x30/0x30 [ 290.839215] ? _raw_spin_unlock_irq+0x27/0x70 [ 290.843692] ? finish_task_switch+0x1c1/0x7e0 [ 290.848170] ? syscall_return_slowpath+0x550/0x550 [ 290.853082] ? syscall_return_slowpath+0x2ac/0x550 [ 290.857994] ? prepare_exit_to_usermode+0x350/0x350 [ 290.862999] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 290.868372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.873201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.878369] RIP: 0033:0x454e79 [ 290.881539] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.889229] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 290.896480] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 290.903728] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 290.910977] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 290.918233] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d 2018/03/30 19:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000002c0)={0xffffffffffffff9c}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000400)={r1}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000340)={r2, r0}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xfffffffffffffff7, 0xe4, &(0x7f00000001c0)=""/228, 0x0, 0x1}, 0x48) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r3) 2018/03/30 19:03:27 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) recvmsg(0xffffffffffffff9c, &(0x7f0000003380)={&(0x7f0000002100)=@hci={0x0, 0x0}, 0x80, &(0x7f0000003240)=[{&(0x7f0000002180)=""/27, 0x1b}, {&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f00000031c0)=""/71, 0x47}], 0x3, &(0x7f0000003280)=""/241, 0xf1, 0x80000000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000033c0)={0xc, 0xe, &(0x7f0000000040)=@raw=[@generic={0x6, 0x4, 0x3, 0x7fffffff}, @alu={0x4, 0x89, 0xb, 0xf, 0xb, 0x18, 0x10}, @alu={0x4, 0x6, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @exit={0x95}, @map={0x18, 0x7, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x16}, @map={0x18, 0xf, 0x1, 0x0, r0}], &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x51, &(0x7f0000000180)=""/81, 0x40f00, 0x1, [], r1}, 0x48) 2018/03/30 19:03:27 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe30"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:27 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={0xffffffffffffffff, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:28 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe30"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:28 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:28 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r7}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={0xffffffffffffffff, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r8, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r8, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) 2018/03/30 19:03:28 executing program 0 (fault-call:15 fault-nth:30): bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x5, 0x3, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xd, 0x101, 0x4, 0x3ff, 0x0, 0xffffffffffffffff, 0x3, [0x115]}, 0x2c) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0xb, 0x7e, 0x3, 0x1, 0x11}, 0x2c) mount(&(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x4000, &(0x7f0000000200)) r1 = socket$kcm(0x29, 0x2, 0x0) socketpair(0x2, 0x0, 0x7fff, &(0x7f0000000640)) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000240)) sendmsg$kcm(r1, &(0x7f0000000bc0)={&(0x7f00000007c0)=@rc={0x1f, {0x5, 0x50000000, 0x0, 0x0, 0x4}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000840)="09c9453aa30d8c5fba221fa2413f12c580837b2ae292e3ee8dd00098c404125a1a2e63840f82a2f69c3927af43b828422484aaeeceebcbe76e999bd3930c9b7c2995484407f9166e39c2069a88b63a980b9b5ffc880f4b89dde5adae6c7fb84ed98cbac860214dfb0b28d1b2e2d58aefebdfe515334f2ffa46be22ef7a4b3a276cb70a27c9e9f5de0a20bad24cbe2b89aee9693c2f8f186ea59fcfc4ebec7188cca0418d4583a6f1730f62416d70cd62555eb4f58ea831d1fea9956a2cba0049f23bf0b249f5de2ce0dc303808d70b0ccab3c7f37e949e", 0xd7}], 0x1, &(0x7f0000000980), 0x0, 0x20004805}, 0x4010) r2 = perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x2367, 0x0, 0x1, 0x6, 0x0, 0x78b1, 0x1, 0x0, 0x4992c766, 0x0, 0x81, 0x100, 0x40, 0x3, 0x9, 0x8, 0x1, 0x10000, 0x1182, 0x6, 0x90e, 0x9, 0x7ff, 0x5da, 0x8, 0x0, 0x30, 0x20, 0x7fffffff, 0x6, 0x401, 0x2, 0x1000, 0x8001, 0x1ff, 0xfffffffffffffff8, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x8}, 0x1ab23, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x10, r0, 0x1) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f00000004c0)) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000000)={&(0x7f0000000080)='./file0/file0\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000002cc0)={0x5, 0x100, 0x56c96e7a, 0xea, 0xa, 0xffffffffffffffff, 0x4000000009}, 0x2c) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000480)='rpc_pipefs\x00', 0x200000, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000600)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000980)='fuseblk\x00', 0x0, &(0x7f0000000240)) mount(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='minix\x00', 0x1000, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x80) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000ac0)='./file0/file0\x00', &(0x7f0000000780)='fuse\x00', 0x0, &(0x7f0000000b00)="b9fc179e3093dec540697d223abb3839b14e772b8e26e104100ff9d93ed91f6955f5701ede88ca117893a87cc6135e36851cf411dcc16f4f5e3821f842d1386ebb19beb5df3ae0dcd0460f4076fd3132dae2c7417db05ddf70e4d3f97fc272d6f129c8") gettid() close(0xffffffffffffffff) 2018/03/30 19:03:28 executing program 4: socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000080000004500000000003d48f6c32c093116c200"], &(0x7f0000000000)='@pH \x00', 0x10000002, 0x99, &(0x7f0000000000)=""/153, 0x0, 0xfffffffffffffffe}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000600000000000000000000009500000000ec22000000"], &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) socketpair(0x1b, 0x800, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x8}, 0x10) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x1, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x6, 0x0, 0x6e1e, 0x4, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffff9c, 0x0) 2018/03/30 19:03:28 executing program 1: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffff, 0x4, 0x10}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f0000000040)}, 0x10) socketpair$packet(0x11, 0x3, 0x300, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000001c0)=0x2) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001c00)={&(0x7f0000000000)='./file0\x00', 0x0, 0x13}, 0x10) socketpair(0x1e, 0x800000000000001, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r3, &(0x7f0000007800)={&(0x7f0000006140)=@ll={0x0, 0x0, 0x0}, 0x80, &(0x7f0000007740)=[{&(0x7f00000061c0)=""/144, 0x90}, {&(0x7f0000007280)=""/10, 0xed}, {&(0x7f00000072c0)=""/142, 0x8e}, {&(0x7f0000007380)=""/159, 0x9f}, {&(0x7f0000007440)=""/193, 0xc1}, {&(0x7f0000007540)=""/235, 0xeb}, {&(0x7f0000007640)=""/178, 0xb2}, {&(0x7f0000007700)=""/62, 0x3e}], 0x8, 0x0, 0x0, 0x1f}, 0x4000) sendmsg(r3, &(0x7f0000007e80)={&(0x7f0000007840)=@can={0x1d, r5}, 0x80, &(0x7f0000007c00)=[{&(0x7f00000078c0)="c76c137e82d227eb6aecf382b7934e1aa44134910b6b5cd5a07ee7ac699da8c83fcd8cf180b1d95da323f0cbe73572cea30f1b68057b38c3e672839e813b8733185864522190faa56979f54927d8a1ade910877d8cd6b41d825a19e334d58ceff59970", 0x63}], 0x1, &(0x7f0000007c80), 0x0, 0x20000044}, 0xe43773736c594b20) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x28a, &(0x7f0000000000), 0x2c5}, 0x50) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000001c40)=@l2, 0x80, &(0x7f0000000180)=[{&(0x7f0000001cc0)=""/127, 0x7f}], 0x1, &(0x7f0000001d40)=""/228, 0xe4, 0xfffffffffffffff7}, 0x12020) close(r4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x8}, 0x10) recvmsg$kcm(r3, &(0x7f0000001bc0)={&(0x7f0000000880)=@can, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000900)}, {&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/15, 0xf}, {&(0x7f0000000a80)=""/4096, 0x1000}], 0x4, &(0x7f0000001b00)=""/166, 0xa6, 0x8001}, 0x40) mkdir(&(0x7f00000007c0)='./file0\x00', 0x84) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000840)={&(0x7f0000000800)='./file1\x00', 0x0, 0x18}, 0x10) close(r3) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@ax25, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)=""/124, 0x7c}], 0x1, &(0x7f0000000340)=""/32, 0x20, 0x7}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xe, &(0x7f00000003c0)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xc}, @jmp={0x5, 0x24, 0x2, 0x0, 0x7, 0x0, 0x1}, @alu={0x7, 0x10000, 0x7, 0xf, 0x5, 0xfffffffc, 0x4}, @alu={0x0, 0x4207acd2, 0x4, 0xf, 0x2, 0x3c, 0x1}, @jmp={0x5, 0x2, 0xb, 0xd, 0x9, 0xffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x2a}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0x25, &(0x7f0000000480)=""/37, 0x41100, 0x1}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000540)=r6, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)='N', &(0x7f0000000180)}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001e40)={&(0x7f0000001ac0)='./file0\x00', 0x0, 0x10}, 0x10) socketpair(0xf, 0x6, 0xb0d, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000fc0)={r7, &(0x7f0000000dc0)="805fcfc7206b2df79836e22fd1d0397a9db51aecad285076a5de25f0b60a8d100e170937a74621967cb8e314b71192381f9a178020032a37e5ef0b8cab2f9bef88bb6808507001b6f56fb00458545e8ef97d1fc7bfadb16354d774a14cb8a87f82daad3f5052bee2779d8e21e07334ce17a0d541f3e79f40d48335efdbb6ff70182d5c8a6b6bcc228a121d411e4b78199f4c084ddb6d22a4923907765abf00adb9731c5b5de2d63813c5f0dea26cf6ab768f4407419f6d27d66bb6328d39cf8694e5b9d430b2e42f55182da888b0704be6dde8304447420800ff7eaa6d4dc0448f8357d17a1a36f5c671198b88a22ad3953b6e1e674700", &(0x7f0000000ec0)="8a0a0c4150736d723288eab817b4f97d5de392acff17e3c69b0d34d3c72b1c7ec69df4dd94b6bb9b3e05d8067bfa4749141ad2165ad23f54ea1ff9b30f73480ddc9e962c4df32cba570c05e8a7bbea41a22257e0f0f669363c878069b46a01005e56e53c787520b3032fb37bf2c2ef2691ece597a05d408a6a9a808335cb09d4b34096568c980f2724401b42df6abfaaa053b64d16829938600b04524fee6832adfbf78b68c24522397517c435a36d04fabeefc718ec0b6874c97aab67cc0ce23fdd6e561d93edc58a69814b3f735f348be1c8cda2465b311e5dbf9aa89c0f27d98746ab99d193", 0x2}, 0x20) 2018/03/30 19:03:28 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe30"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000500)="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", &(0x7f0000000040)=""/168}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) 2018/03/30 19:03:28 executing program 6: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(0xffffffffffffffff, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) [ 291.450614] FAULT_INJECTION: forcing a failure. [ 291.450614] name failslab, interval 1, probability 0, space 0, times 0 [ 291.462433] CPU: 1 PID: 19007 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 291.469713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.479067] Call Trace: [ 291.481662] dump_stack+0x194/0x24d [ 291.485302] ? arch_local_irq_restore+0x53/0x53 [ 291.489991] should_fail+0x8c0/0xa40 [ 291.493712] ? __list_lru_init+0x352/0x750 [ 291.497955] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 291.503066] ? trace_hardirqs_off+0x10/0x10 [ 291.507372] ? find_next_zero_bit+0xe3/0x110 [ 291.511779] ? find_held_lock+0x35/0x1d0 [ 291.515828] ? __lock_is_held+0xb6/0x140 [ 291.519884] ? check_same_owner+0x320/0x320 [ 291.524185] ? lock_downgrade+0x980/0x980 [ 291.528319] ? rcu_note_context_switch+0x710/0x710 [ 291.533230] ? find_held_lock+0x35/0x1d0 [ 291.537278] should_failslab+0xec/0x120 [ 291.542318] __kmalloc+0x63/0x760 [ 291.545756] ? lock_downgrade+0x980/0x980 [ 291.549892] ? register_shrinker+0x10e/0x2d0 [ 291.554311] ? trace_event_raw_event_module_request+0x320/0x320 [ 291.560367] register_shrinker+0x10e/0x2d0 [ 291.564588] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 291.570369] ? memcpy+0x45/0x50 [ 291.573634] sget_userns+0xbbf/0xe40 [ 291.577328] ? set_anon_super+0x20/0x20 [ 291.581288] ? put_filp+0x90/0x90 [ 291.584722] ? destroy_unused_super.part.6+0xd0/0xd0 [ 291.589815] ? path_lookupat+0x238/0xba0 [ 291.593858] ? mnt_free_id.isra.21+0x50/0x50 [ 291.598252] ? trace_hardirqs_off+0x10/0x10 [ 291.602559] ? putname+0xee/0x130 [ 291.606000] ? cap_capable+0x1b5/0x230 [ 291.609877] ? security_capable+0x8e/0xc0 [ 291.614017] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 291.619197] ? ns_capable_common+0xcf/0x160 [ 291.623502] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 291.628761] mount_ns+0x6d/0x190 [ 291.632114] rpc_mount+0x9e/0xd0 [ 291.635462] mount_fs+0x66/0x2d0 [ 291.638821] vfs_kern_mount.part.26+0xc6/0x4a0 [ 291.643385] ? may_umount+0xa0/0xa0 [ 291.646991] ? _raw_read_unlock+0x22/0x30 [ 291.651122] ? __get_fs_type+0x8a/0xc0 [ 291.654999] do_mount+0xea4/0x2bb0 [ 291.658527] ? __might_fault+0x110/0x1d0 [ 291.662573] ? copy_mount_string+0x40/0x40 [ 291.666793] ? __check_object_size+0x8b/0x530 [ 291.671278] ? __might_sleep+0x95/0x190 [ 291.675246] ? kasan_check_write+0x14/0x20 [ 291.679466] ? _copy_from_user+0x99/0x110 [ 291.683616] ? memdup_user+0x5e/0x90 [ 291.687310] ? copy_mount_options+0x1f7/0x2e0 [ 291.691800] SyS_mount+0xab/0x120 [ 291.695235] ? copy_mnt_ns+0xb30/0xb30 [ 291.699106] do_syscall_64+0x281/0x940 [ 291.702971] ? vmalloc_sync_all+0x30/0x30 [ 291.707099] ? _raw_spin_unlock_irq+0x27/0x70 [ 291.711574] ? finish_task_switch+0x1c1/0x7e0 [ 291.716053] ? syscall_return_slowpath+0x550/0x550 [ 291.721932] ? syscall_return_slowpath+0x2ac/0x550 [ 291.726845] ? prepare_exit_to_usermode+0x350/0x350 [ 291.731855] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 291.737291] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.742124] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 291.747293] RIP: 0033:0x454e79 2018/03/30 19:03:28 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r1 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r2 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r5, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, 0xffffffffffffffff) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r4, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r7, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r8}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79", 0x80}, {&(0x7f0000007d00)="1d1a400713c41032a61f24653570a10136323ec769ad48b324b06b10733c28e11b8b1a3c20702d0059876ed6f8a407340c8361cbf4105fd4511f3ca720900a8cd26566424b2740c285110e8d4ade3f47c3db608e825ea4876dc399896dbf685e66ea9a2138baa6af2b88ec0f69ca433184553ddd7834f632a58c858bf9135efa62c7e6656d873699808c9b82b10344d415347cfc57e30f89d29cd95087bf91bbf3b685d47f34b29e7a7fccaa32a7e294680abb24468c964eab3b76c10cd1ed1e10dbe5c1d4ffcf8b5857479b94730e233fdb4d0fa5457ba8d790a4b080b736e6a161023bd405ac3666e823a777", 0xed}], 0x2, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x38, 0x105, 0x6, "66ec4dd0938e3e5ef0b9cd8024d19c686cbdeb46a8fc40573b05a31aed482f0e7a16"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x208, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r3, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r9, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r9, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r6}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f0000008300)=r4, 0x4) [ 291.750580] RSP: 002b:00007f9da8083c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.758273] RAX: ffffffffffffffda RBX: 00007f9da80846d4 RCX: 0000000000454e79 [ 291.765525] RDX: 0000000020000480 RSI: 0000000020000180 RDI: 0000000020000100 [ 291.772794] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 291.780065] R10: 0000000000200000 R11: 0000000000000246 R12: 0000000000000016 [ 291.787316] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/30 19:03:28 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe30"}], 0x1d0, 0x20004000}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x89e2, &(0x7f0000008340)={r6}) 2018/03/30 19:03:28 executing program 7: r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe7, 0xf9, &(0x7f0000000080)="f8e81b1617b06bb8d8dda191a1d43eb9a1a2254421ef042e984d19ce18a40039cffd8c1775ef632fd3ad856c1bdc6beef66bf6e157cdd21dfe80edb4c171336948a9937c267420721f8c14e3c37838f9f2938018e36683e4ade0650e77d2b2949741b8cc9a3ff6a497e912409ab454cfbfc89b796ad96cd2f68cd785928947bdff7c86bcdf79453a2292b98c729c452f9b5606a87a5e3d7059166453bb8289a48d36e650d4d4aaab87e98d7bdd8b32f4e7f2ffbc391d0c68d335e5b04d41c982da2cca3b61e8a70a066da97b1127542f8c2f6cd70dd532fb071046805be248cfd8cb5d2581e1f6", &(0x7f0000000180)=""/249, 0x100000001, 0x5}, 0x28) r2 = perf_event_open(&(0x7f00000002c0)={0x5, 0x70, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x6, 0xb820a, 0xa, 0x1, 0x6, 0x3, 0x3, 0x8, 0x8, 0x400, 0x6, 0x6, 0x1, 0x3ff, 0x2, 0x0, 0x0, 0x800, 0x2, 0x100000000, 0x7fffffff, 0x0, 0x100000000, 0x6536, 0x7fff, 0x2, 0x4, 0x7ff, 0x1f, 0x7, 0x8, 0x0, 0x2, 0x4, @perf_config_ext={0x28000000, 0x7}, 0x800, 0x2, 0x4, 0x4, 0x1, 0x101}, 0xffffffffffffffff, 0xa, 0xffffffffffffff9c, 0xb) r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0xffffffffffffffac, 0xb16, 0x4, 0x0, 0x100000001, 0x40000, 0xf, 0x9, 0x6, 0x2, 0x4a, 0x4, 0x0, 0x7, 0x7, 0x0, 0x3, 0x0, 0x400, 0x1, 0xfe7, 0x5, 0xfbb, 0x800, 0x2, 0x1, 0x101, 0xc0000000000, 0x5, 0x1, 0x10000000000, 0x8, 0x2fd, 0x8001, 0xe5e7, 0x0, 0x9, 0x1, @perf_config_ext={0xe55, 0x3}, 0x40, 0x4, 0x7, 0x3, 0x4, 0x17, 0xb0}, 0x0, 0x10, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) socketpair(0x8, 0x0, 0x2, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000500)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000580)={r6, 0x28, &(0x7f0000000540)}, 0x10) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r1) recvmsg$kcm(r0, &(0x7f0000000900)={&(0x7f0000000600)=@generic, 0x80, &(0x7f0000000800)=[{&(0x7f0000000680)=""/125, 0x7d}, {&(0x7f0000000700)=""/118, 0x76}, {&(0x7f0000000780)=""/71, 0x47}], 0x3, &(0x7f0000000840)=""/157, 0x9d, 0x7fff}, 0x40000000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000980)='$&{securityproc+-{ppp1\x00') ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f00000009c0)) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000007b80)={&(0x7f0000007780)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x80, &(0x7f0000007ac0)=[{&(0x7f0000007800)=""/125, 0x7d}, {&(0x7f0000007880)=""/141, 0x8d}, {&(0x7f0000007940)=""/139, 0x8b}, {&(0x7f0000007a00)=""/13, 0xd}, {&(0x7f0000007a40)=""/77, 0x4d}], 0x5, &(0x7f0000007b40)=""/63, 0x3f, 0x2}, 0x10000) sendmsg(r8, &(0x7f0000008080)={&(0x7f0000007bc0)=@can={0x1d, r9}, 0x80, &(0x7f0000007e00)=[{&(0x7f0000007c40)="0963c5cb7b4eac1061e6284187b0ad4cd252b4bc0056d6d9b0c4536f4a74d494bf6cad9787bd498bb8b179b627870f6da10c66b90e3fa79960cd31d10d8a060548a630f05a379ccff4e97b9702fa52a43c6487d08564319fdaa0157f61337313f67b793f047de0f413f22ea1f822129f1692a4a0668419fe801625ebd34f3d79c4a0a8f08e3df44e9b013cc52561c2f8337f", 0x92}], 0x1, &(0x7f0000007e40)=[{0xd0, 0x10c, 0x7f, "1dd41510c264ce9814c881924a4957bef7faa543fe6ad1f521deedbcb10dd864c846e7321abe13840bf9830185d4c3fc0adcf8c6a11a94c43655b461383dbc60f949558f22d0a9503b064cfb9e7f60eb7d35a9d557ba5dc75265cca5582a3390b6810334ea7ee2d1fe785d926e98cbd1436d4fdc226d2e8b33570bfd70c416d1960501e316b69af3cff92d3a1d44095b1e70cdc3471e00659009061aa9b8e600db22155789ccd72bd38ac059b3b38e85cf7d03257b15690b2d755278c2"}, {0x100, 0x1ff, 0xffff, "4dbbd3bd7655c5b3dd4152c651604bb83b4cfa95d7c2657b45001d9b6b6808b2fd294c43aa62345e2d1383ce0395fb7f033b13414b77bec261711f3cf3791eecb1a37df6d59b206e9d66079fadc3b66cda4d0c8cf9d9bee9fe80b10e9d9ed60789c0c4e023e3b0b519c374d59dce662addd7fe4a57f6ecf1a53620b121986826a546924936e2b6a977be3ef848c854c739fdc94b84a78ea90818233afbbec40a8c0e6f6446023e00d750198467a8db3046dc2ecaf48d2501559e4ca737ba56e865e12176270e3d3d6c83e2ff032c662ff928ed691679f6dd3b593c77a4cac60589c0e4ea7544c79483ccfe3052"}], 0x1d0}, 0x8090) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000080c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000008180)={r4, 0x50, &(0x7f0000008100)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000081c0)=r10, 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000008200)=r10, 0x4) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000008280)={&(0x7f0000008240)='./file0\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000082c0)) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000008300)=r5, 0x4) 2018/03/30 19:03:28 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x45}, [], {0x95}}, &(0x7f0000000000)='@pH \x00', 0x10000002, 0x35b, &(0x7f0000000000)=""/153}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x6}], {0x95}}, &(0x7f000000c8c0)='syzkaller\x00', 0xd1b, 0x4b4, &(0x7f00000001c0)=""/228}, 0x48) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0xc2d, 0x4, 0xed1a, 0x7f, 0x0, 0x400, 0x10, 0x1, 0x57, 0x100000000, 0xfffffffffffff952, 0x7e4a, 0xe611, 0x96c2, 0x6, 0x5, 0x1, 0x7, 0x4, 0x3, 0x800, 0xffffffffffffff80, 0x80, 0x40, 0x1800000, 0x20, 0x0, 0x8, 0x100000000, 0xfffffffffffff801, 0xfff, 0xcad, 0xbd, 0x8000, 0x8, 0x2, 0x0, 0x6e1e, 0x3, @perf_config_ext={0x9e, 0x5}, 0x8000, 0xb0c, 0x140000, 0x7, 0x9, 0x3, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0x50, &(0x7f00000002c0)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)=r2, 0x3e5) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000018c0)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000440)={r3, r0}) sendmsg$kcm(r3, &(0x7f0000005d80)={&(0x7f0000001900)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x42}, 0x80, &(0x7f0000005c80)=[{&(0x7f0000001980)="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", 0x1000}, {&(0x7f0000002980)="a2945f6a3b65600d7e128c5fd6d1abb5c58c4fa94cd2b59bc7bf8ce7e8380acb8aafbe4e7fc30b626fce9207f15931edd0cc05fab94727334e8fb00a63549e9adbdbd9e5ed448e596439ff4b521e2aaa4cd56b078585b31c46e4cf1f87bc3cba1ff5348ad7e50b507c7c3ef580504394179ab66caa63e25cefeece45", 0x7c}, {&(0x7f0000002a00)="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", 0x1000}, {&(0x7f0000003a00)="b7b96c0ae018f22f74cf3d74c884bb1f33db76ad199d82f6d5756e237250ba35865f9a3fc0021071babc9f16b0ffed718918934047580828ab13f8e2abf9d17eef2d9048849e67", 0x47}, {&(0x7f0000003a80)="b84c4eb4ba79cbc2f59173bcb4bef57ceb85173a2c3caf60aa46db4915effbce39ef9b7c3bea51d587841cc287f4f71d9aa9bff5c8184bfa9bc403a4fa50e6596a68436e3018d0fad21c2b4c68f096823ced7b0026e7327675659aeed4f47c55a975c2a6fc46955b638805d102414e51e0d8099964577abab60cfaa80c98e4c36036738b", 0x84}, {&(0x7f0000003b40)="77b440385a2e02c02738cb17f4a8c60a33716942b21be024aa1b0de7dade3b2ecf12f4204f087bc0d2da87a6c0ef65a197dbc1d25da7e588bdaddd093bc04ba9d691cfc205c7bc8d11a5a7fae5746ff5180437c6e2e7cf44b8cf6fd821b54c7482f41a1caba3e77cb0fc2858bd3d54916b9fd4a2f8f2643cd4adbea90882fd95bf74ecb3d36a20085cde97f2c88eb8465a1dcd5266", 0x95}, {&(0x7f0000003c00)="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", 0x1000}, {&(0x7f0000004c00)="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", 0x1000}, {&(0x7f0000005c00)="5011392ab30d22598696968963af480f42f5b53bb1a22e29888622ead4595856fd99d42de292d146e1ac184e7a57f62aa1bebfea667ab5b7c88aaa9edba7258660d7104cfa11e64b030a7200959b19b613a6b1ef0126640e2e697b4bbd40ffcb38308e9ce4c8e39bc1c2f0dafe8353cb909749773a", 0x75}], 0x9, &(0x7f0000005d40)=[{0x10, 0x116, 0xff}], 0x10, 0x20000041}, 0x4) 2018/03/30 19:03:28 executing program 2: perf_event_open(&(0x7f000025c000)={0x5, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0xff, 0x2e, 0x9}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r0, &(0x7f00000000c0)}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000003c0)=""/244}, 0x18) [ 291.944761] ------------[ cut here ]------------ [ 291.949622] refcount_t: increment on 0; use-after-free. [ 291.955155] WARNING: CPU: 0 PID: 4525 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 291.962857] Kernel panic - not syncing: panic_on_warn set ... [ 291.962857] [ 291.970198] CPU: 0 PID: 4525 Comm: syz-executor0 Not tainted 4.16.0-rc6+ #42 [ 291.977356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.986683] Call Trace: [ 291.989253] dump_stack+0x194/0x24d [ 291.992859] ? arch_local_irq_restore+0x53/0x53 [ 291.997504] ? vsnprintf+0x1ed/0x1900 [ 292.001287] panic+0x1e4/0x41c [ 292.004456] ? refcount_error_report+0x214/0x214 [ 292.009186] ? show_regs_print_info+0x18/0x18 [ 292.013660] ? __warn+0x1c1/0x200 [ 292.017090] ? refcount_inc+0x47/0x50 [ 292.020866] __warn+0x1dc/0x200 [ 292.024119] ? refcount_inc+0x47/0x50 [ 292.027893] report_bug+0x1f4/0x2b0 [ 292.031499] fixup_bug.part.10+0x37/0x80 [ 292.035534] do_error_trap+0x2d7/0x3e0 [ 292.039398] ? vprintk_default+0x28/0x30 [ 292.043435] ? math_error+0x400/0x400 [ 292.047209] ? printk+0xaa/0xca [ 292.050467] ? show_regs_print_info+0x18/0x18 [ 292.054957] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.059777] do_invalid_op+0x1b/0x20 [ 292.063468] invalid_op+0x1b/0x40 [ 292.066896] RIP: 0010:refcount_inc+0x47/0x50 [ 292.071275] RSP: 0018:ffff8801a3847860 EFLAGS: 00010286 [ 292.076615] RAX: dffffc0000000008 RBX: ffff8801a1672084 RCX: ffffffff815b421e [ 292.083859] RDX: 0000000000000000 RSI: 1ffff10034708ebc RDI: 1ffff10034708e91 [ 292.091104] RBP: ffff8801a3847868 R08: 0000000000000000 R09: 0000000000000000 [ 292.098348] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801a3847af8 [ 292.105594] R13: ffff88019e370013 R14: ffff8801a1672080 R15: ffff88019e370001 [ 292.112848] ? vprintk_func+0x5e/0xc0 [ 292.116630] sk_alloc+0x3f9/0x1440 [ 292.120149] ? sock_def_error_report+0x5e0/0x5e0 [ 292.124897] ? __raw_spin_lock_init+0x2d/0x100 [ 292.129455] ? trace_hardirqs_off+0x10/0x10 [ 292.133753] ? do_raw_write_unlock+0x290/0x290 [ 292.138310] ? trace_hardirqs_off+0x10/0x10 [ 292.142606] ? __raw_spin_lock_init+0x1c/0x100 [ 292.147172] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 292.152165] ? find_held_lock+0x35/0x1d0 [ 292.156207] ? inet_create+0x3fc/0xf50 [ 292.160084] ? lock_downgrade+0x980/0x980 [ 292.164207] ? lock_release+0xa40/0xa40 [ 292.168164] ? lock_downgrade+0x980/0x980 [ 292.172296] inet_create+0x47c/0xf50 [ 292.175990] ? ipip_gro_receive+0xf0/0xf0 [ 292.180115] ? __lock_is_held+0xb6/0x140 [ 292.184157] __sock_create+0x4d4/0x850 [ 292.188034] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 292.192941] ? user_path_create+0x40/0x40 [ 292.197064] SyS_socket+0xeb/0x1d0 [ 292.200582] ? fillonedir+0x250/0x250 [ 292.204358] ? move_addr_to_kernel+0x60/0x60 [ 292.208741] ? getname_flags+0x256/0x580 [ 292.212778] ? do_syscall_64+0xb7/0x940 [ 292.216748] ? move_addr_to_kernel+0x60/0x60 [ 292.221132] do_syscall_64+0x281/0x940 [ 292.224996] ? vmalloc_sync_all+0x30/0x30 [ 292.229126] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 292.234640] ? syscall_return_slowpath+0x550/0x550 [ 292.239544] ? syscall_return_slowpath+0x2ac/0x550 [ 292.244455] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 292.249795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.254616] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.259780] RIP: 0033:0x4579a7 [ 292.262945] RSP: 002b:00007ffc2cb66c18 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 292.270640] RAX: ffffffffffffffda RBX: 00000000000001f1 RCX: 00000000004579a7 [ 292.277888] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 292.285150] RBP: 0000000000047430 R08: 0000000000000000 R09: 0000000000000001 [ 292.292396] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000450 [ 292.299642] R13: 0000000000000018 R14: 0000000000000450 R15: 000000000004725a [ 292.307602] Dumping ftrace buffer: [ 292.311127] (ftrace buffer empty) [ 292.314810] Kernel Offset: disabled [ 292.318413] Rebooting in 86400 seconds..